Skip to main content

CVE-2025-8772: Server-Side Request Forgery in Vinades NukeViet

Medium
VulnerabilityCVE-2025-8772cvecve-2025-8772
Published: Sat Aug 09 2025 (08/09/2025, 19:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Vinades
Product: NukeViet

Description

A vulnerability, which was classified as problematic, has been found in Vinades NukeViet up to 4.5.06. This issue affects some unknown processing of the file /admin/index.php?language=en&nv=upload of the component Module Handler. The manipulation leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/17/2025, 01:00:11 UTC

Technical Analysis

CVE-2025-8772 is a Server-Side Request Forgery (SSRF) vulnerability identified in Vinades NukeViet version 4.5.06, specifically within the Module Handler component accessed via the /admin/index.php endpoint with parameters language=en and nv=upload. SSRF vulnerabilities occur when an attacker can manipulate a server to make HTTP requests to arbitrary domains or internal systems, potentially bypassing network restrictions and accessing sensitive internal resources. In this case, the vulnerability arises from improper processing of input parameters that allow an attacker to craft requests that the server executes on their behalf. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing its risk profile. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low complexity, no privileges or user interaction needed, and limited impact on confidentiality. The vendor was notified but did not respond, and no official patch or mitigation guidance has been released. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation by threat actors. SSRF can be leveraged to scan internal networks, access metadata services, or exploit other internal vulnerabilities, potentially leading to further compromise.

Potential Impact

For European organizations using Vinades NukeViet 4.5.06, this SSRF vulnerability poses a moderate risk. Organizations with publicly accessible administrative interfaces are particularly vulnerable, as attackers can remotely trigger the SSRF without authentication. The impact includes potential unauthorized access to internal network resources, exposure of sensitive data, and pivoting opportunities for attackers to escalate privileges or move laterally within the network. Given the lack of vendor response and absence of patches, organizations may face prolonged exposure. This is especially concerning for sectors with strict data protection requirements under GDPR, as internal data leakage or unauthorized access could lead to regulatory penalties and reputational damage. Additionally, organizations relying on NukeViet for content management or web services may experience service disruptions if attackers leverage SSRF to perform denial-of-service attacks or exploit other chained vulnerabilities.

Mitigation Recommendations

Since no official patch is available, European organizations should implement immediate compensating controls. First, restrict access to the /admin/index.php endpoint via network-level controls such as IP whitelisting or VPN-only access to limit exposure. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious request patterns targeting the nv=upload parameter. Conduct thorough input validation and sanitization on parameters to prevent malicious URL injection. Monitor server logs for unusual outbound requests originating from the vulnerable endpoint to detect exploitation attempts. If feasible, disable or restrict the vulnerable Module Handler component until a patch is released. Regularly review and update internal network segmentation to minimize the impact of SSRF exploitation. Finally, maintain active threat intelligence monitoring for any emerging exploits or vendor updates related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-08T20:13:28.806Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6897a5e7ad5a09ad000e3e18

Added to database: 8/9/2025, 7:47:51 PM

Last enriched: 8/17/2025, 1:00:11 AM

Last updated: 9/24/2025, 6:41:48 PM

Views: 40

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats