Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-71259: CWE-918 Server-Side Request Forgery (SSRF) in BMC Software, Inc. FootPrints

0
Medium
VulnerabilityCVE-2025-71259cvecve-2025-71259cwe-918
Published: Thu Mar 19 2026 (03/19/2026, 13:44:38 UTC)
Source: CVE Database V5
Vendor/Project: BMC Software, Inc.
Product: FootPrints

Description

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind server-side request forgery vulnerability in the externalfeed/RSS API component that allows authenticated attackers to trigger arbitrary outbound requests from the server. Attackers can exploit insufficient validation of externally supplied resource references to interact with internal services or cause resource exhaustion impacting availability. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.

AI-Powered Analysis

AILast updated: 03/19/2026, 14:09:12 UTC

Technical Analysis

CVE-2025-71259 is a server-side request forgery vulnerability classified under CWE-918, found in BMC Software's FootPrints IT Service Management (ITSM) product. The vulnerability resides in the externalfeed/RSS API component of FootPrints versions 20.20.02 through 20.24.01.001. It allows an authenticated attacker with low privileges to send crafted requests that cause the server to initiate arbitrary outbound HTTP requests. This occurs due to insufficient validation of externally supplied resource references, enabling attackers to coerce the server into interacting with internal network services that may not be directly accessible externally. The SSRF can be exploited blindly, meaning attackers do not receive direct response data but can infer success through side effects. Potential impacts include unauthorized internal network reconnaissance, exploitation of internal services, or resource exhaustion leading to denial of service. The vulnerability does not require user interaction and does not affect confidentiality or integrity directly but can impact availability and internal network security posture. BMC has released multiple hotfixes across affected versions to address this issue, and no public exploits have been reported to date.

Potential Impact

The primary impact of CVE-2025-71259 is the potential for attackers to leverage the SSRF vulnerability to interact with internal services that are otherwise inaccessible, potentially exposing sensitive internal resources or enabling lateral movement within an organization's network. Additionally, attackers can cause resource exhaustion on the FootPrints server, leading to degraded performance or denial of service, impacting availability of ITSM services critical for organizational operations. Since the vulnerability requires authentication with low privileges, insider threats or compromised accounts could be leveraged to exploit this flaw. The lack of direct data exfiltration reduces confidentiality impact, but the ability to reach internal systems poses a significant risk, especially in segmented or sensitive environments. Organizations relying on BMC FootPrints for IT service management could face operational disruptions and increased risk of internal network compromise if this vulnerability is exploited.

Mitigation Recommendations

Organizations should promptly apply the official hotfixes provided by BMC Software for their specific FootPrints ITSM version to remediate the SSRF vulnerability. In addition, implement strict network segmentation and firewall rules to limit the FootPrints server's ability to initiate outbound requests to only necessary destinations. Monitor and audit authenticated user activities to detect unusual patterns that may indicate exploitation attempts. Employ strong authentication and access controls to minimize the risk of account compromise or misuse by low-privilege users. Consider deploying web application firewalls (WAFs) with rules designed to detect and block SSRF attack patterns targeting the externalfeed/RSS API endpoints. Regularly review and update security policies related to internal service exposure and outbound traffic from critical servers. Finally, conduct internal penetration testing and vulnerability assessments to verify the effectiveness of mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-02T15:04:45.927Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bc0011e32a4fbe5fc6a5cf

Added to database: 3/19/2026, 1:54:25 PM

Last enriched: 3/19/2026, 2:09:12 PM

Last updated: 3/20/2026, 5:17:19 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses