CVE-2026-25870: CWE-918 Server-Side Request Forgery (SSRF) in doramart DoraCMS
DoraCMS version 3.1 and prior contains a server-side request forgery (SSRF) vulnerability in its UEditor remote image fetch functionality. The application accepts user-supplied URLs and performs server-side HTTP or HTTPS requests without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal or private IP address ranges, or apply request timeouts or response size limits. An attacker can abuse this behavior to induce the server to issue outbound requests to arbitrary hosts, including internal network resources, potentially enabling internal network scanning and denial of service through resource exhaustion.
AI Analysis
Technical Summary
CVE-2026-25870 is a server-side request forgery (SSRF) vulnerability identified in DoraCMS, an open-source content management system, specifically affecting versions 3.1 and prior. The vulnerability resides in the UEditor remote image fetch functionality, which allows users to submit URLs for the server to retrieve images. However, the server-side implementation lacks sufficient validation and destination restrictions, such as allowlists or blocking of internal/private IP ranges. Consequently, an attacker can craft malicious URLs that cause the server to initiate HTTP or HTTPS requests to arbitrary hosts, including internal network addresses that are typically inaccessible externally. This can facilitate internal network scanning, exposing sensitive infrastructure details, or lead to denial of service by exhausting server resources through large or slow responses. The vulnerability does not require any authentication or user interaction, increasing its exploitability. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on integrity and availability. No public exploits are known at this time, but the lack of mitigations such as request timeouts or response size limits increases the risk of resource exhaustion attacks. The vulnerability highlights the importance of robust input validation and network request controls in web applications that fetch remote resources based on user input.
Potential Impact
For European organizations, this SSRF vulnerability poses several risks. First, it can be leveraged to perform internal network reconnaissance, potentially exposing sensitive systems behind firewalls that are not otherwise accessible from the internet. This is particularly concerning for organizations with segmented networks or critical infrastructure protected by perimeter defenses. Second, attackers could exploit the vulnerability to cause denial of service by forcing the server to make numerous or slow requests, exhausting CPU, memory, or network bandwidth. This could disrupt availability of the CMS and dependent services. Third, if internal services have weak authentication or known vulnerabilities, SSRF could serve as a pivot point for further compromise. Given DoraCMS is used in various sectors including small to medium enterprises and possibly public sector websites, the impact could range from data exposure to operational disruption. The medium severity rating reflects that while the vulnerability is serious, it does not directly allow remote code execution or data exfiltration without additional conditions. However, the ease of exploitation without authentication and the potential to reach internal resources make it a significant concern for organizations relying on DoraCMS in Europe.
Mitigation Recommendations
To mitigate CVE-2026-25870, organizations should first upgrade DoraCMS to a version where this vulnerability is patched once available. In the absence of an official patch, administrators should implement strict input validation on URLs accepted by the UEditor remote image fetch feature. This includes enforcing allowlists of trusted domains and explicitly blocking requests to private, loopback, link-local, and reserved IP address ranges (e.g., 10.0.0.0/8, 192.168.0.0/16, 127.0.0.0/8). Additionally, applying network-level controls such as firewall rules to restrict outbound HTTP/HTTPS requests from the CMS server can reduce risk. Implementing request timeouts and limiting response sizes can prevent resource exhaustion attacks. Monitoring and logging outbound requests initiated by the CMS can help detect suspicious activity. If feasible, disabling the remote image fetch feature entirely or restricting it to trusted users can further reduce exposure. Finally, organizations should conduct internal network scans to identify any sensitive services that could be targeted via SSRF and strengthen their security posture accordingly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2026-25870: CWE-918 Server-Side Request Forgery (SSRF) in doramart DoraCMS
Description
DoraCMS version 3.1 and prior contains a server-side request forgery (SSRF) vulnerability in its UEditor remote image fetch functionality. The application accepts user-supplied URLs and performs server-side HTTP or HTTPS requests without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal or private IP address ranges, or apply request timeouts or response size limits. An attacker can abuse this behavior to induce the server to issue outbound requests to arbitrary hosts, including internal network resources, potentially enabling internal network scanning and denial of service through resource exhaustion.
AI-Powered Analysis
Technical Analysis
CVE-2026-25870 is a server-side request forgery (SSRF) vulnerability identified in DoraCMS, an open-source content management system, specifically affecting versions 3.1 and prior. The vulnerability resides in the UEditor remote image fetch functionality, which allows users to submit URLs for the server to retrieve images. However, the server-side implementation lacks sufficient validation and destination restrictions, such as allowlists or blocking of internal/private IP ranges. Consequently, an attacker can craft malicious URLs that cause the server to initiate HTTP or HTTPS requests to arbitrary hosts, including internal network addresses that are typically inaccessible externally. This can facilitate internal network scanning, exposing sensitive infrastructure details, or lead to denial of service by exhausting server resources through large or slow responses. The vulnerability does not require any authentication or user interaction, increasing its exploitability. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on integrity and availability. No public exploits are known at this time, but the lack of mitigations such as request timeouts or response size limits increases the risk of resource exhaustion attacks. The vulnerability highlights the importance of robust input validation and network request controls in web applications that fetch remote resources based on user input.
Potential Impact
For European organizations, this SSRF vulnerability poses several risks. First, it can be leveraged to perform internal network reconnaissance, potentially exposing sensitive systems behind firewalls that are not otherwise accessible from the internet. This is particularly concerning for organizations with segmented networks or critical infrastructure protected by perimeter defenses. Second, attackers could exploit the vulnerability to cause denial of service by forcing the server to make numerous or slow requests, exhausting CPU, memory, or network bandwidth. This could disrupt availability of the CMS and dependent services. Third, if internal services have weak authentication or known vulnerabilities, SSRF could serve as a pivot point for further compromise. Given DoraCMS is used in various sectors including small to medium enterprises and possibly public sector websites, the impact could range from data exposure to operational disruption. The medium severity rating reflects that while the vulnerability is serious, it does not directly allow remote code execution or data exfiltration without additional conditions. However, the ease of exploitation without authentication and the potential to reach internal resources make it a significant concern for organizations relying on DoraCMS in Europe.
Mitigation Recommendations
To mitigate CVE-2026-25870, organizations should first upgrade DoraCMS to a version where this vulnerability is patched once available. In the absence of an official patch, administrators should implement strict input validation on URLs accepted by the UEditor remote image fetch feature. This includes enforcing allowlists of trusted domains and explicitly blocking requests to private, loopback, link-local, and reserved IP address ranges (e.g., 10.0.0.0/8, 192.168.0.0/16, 127.0.0.0/8). Additionally, applying network-level controls such as firewall rules to restrict outbound HTTP/HTTPS requests from the CMS server can reduce risk. Implementing request timeouts and limiting response sizes can prevent resource exhaustion attacks. Monitoring and logging outbound requests initiated by the CMS can help detect suspicious activity. If feasible, disabling the remote image fetch feature entirely or restricting it to trusted users can further reduce exposure. Finally, organizations should conduct internal network scans to identify any sensitive services that could be targeted via SSRF and strengthen their security posture accordingly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-06T19:12:03.464Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698bb1b44b57a58fa12ed728
Added to database: 2/10/2026, 10:31:16 PM
Last enriched: 2/18/2026, 9:47:33 AM
Last updated: 2/21/2026, 12:16:04 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.