CVE-2026-25870: CWE-918 Server-Side Request Forgery (SSRF) in doramart DoraCMS
DoraCMS version 3.1 and prior contains a server-side request forgery (SSRF) vulnerability in its UEditor remote image fetch functionality. The application accepts user-supplied URLs and performs server-side HTTP or HTTPS requests without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal or private IP address ranges, or apply request timeouts or response size limits. An attacker can abuse this behavior to induce the server to issue outbound requests to arbitrary hosts, including internal network resources, potentially enabling internal network scanning and denial of service through resource exhaustion.
AI Analysis
Technical Summary
CVE-2026-25870 is a server-side request forgery (SSRF) vulnerability affecting DoraCMS version 3.1 and prior. It exists in the UEditor remote image fetch functionality, where user-supplied URLs are fetched by the server without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal/private IP addresses, or apply request timeouts or response size limits. This allows attackers to induce the server to make HTTP/HTTPS requests to arbitrary hosts, including internal network resources, potentially enabling internal network reconnaissance and denial of service through resource exhaustion. The vulnerability has a CVSS 4.0 score of 6.9 (medium severity). There is no vendor advisory or patch information available at this time.
Potential Impact
An attacker can exploit this SSRF vulnerability to cause the DoraCMS server to make unauthorized HTTP/HTTPS requests to arbitrary external or internal network hosts. This can lead to internal network scanning, potentially exposing sensitive internal services. Additionally, the lack of request timeouts and response size limits may allow denial of service conditions via resource exhaustion on the server. There are no known exploits in the wild reported. The vulnerability is rated medium severity with a CVSS 4.0 score of 6.9.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, users should consider disabling or restricting the UEditor remote image fetch functionality to prevent untrusted URL inputs. Implementing network-level controls to restrict outbound HTTP/HTTPS requests from the server to trusted destinations may help mitigate risk. Monitor vendor channels for updates regarding patches or official mitigations.
CVE-2026-25870: CWE-918 Server-Side Request Forgery (SSRF) in doramart DoraCMS
Description
DoraCMS version 3.1 and prior contains a server-side request forgery (SSRF) vulnerability in its UEditor remote image fetch functionality. The application accepts user-supplied URLs and performs server-side HTTP or HTTPS requests without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal or private IP address ranges, or apply request timeouts or response size limits. An attacker can abuse this behavior to induce the server to issue outbound requests to arbitrary hosts, including internal network resources, potentially enabling internal network scanning and denial of service through resource exhaustion.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25870 is a server-side request forgery (SSRF) vulnerability affecting DoraCMS version 3.1 and prior. It exists in the UEditor remote image fetch functionality, where user-supplied URLs are fetched by the server without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal/private IP addresses, or apply request timeouts or response size limits. This allows attackers to induce the server to make HTTP/HTTPS requests to arbitrary hosts, including internal network resources, potentially enabling internal network reconnaissance and denial of service through resource exhaustion. The vulnerability has a CVSS 4.0 score of 6.9 (medium severity). There is no vendor advisory or patch information available at this time.
Potential Impact
An attacker can exploit this SSRF vulnerability to cause the DoraCMS server to make unauthorized HTTP/HTTPS requests to arbitrary external or internal network hosts. This can lead to internal network scanning, potentially exposing sensitive internal services. Additionally, the lack of request timeouts and response size limits may allow denial of service conditions via resource exhaustion on the server. There are no known exploits in the wild reported. The vulnerability is rated medium severity with a CVSS 4.0 score of 6.9.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, users should consider disabling or restricting the UEditor remote image fetch functionality to prevent untrusted URL inputs. Implementing network-level controls to restrict outbound HTTP/HTTPS requests from the server to trusted destinations may help mitigate risk. Monitor vendor channels for updates regarding patches or official mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-06T19:12:03.464Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698bb1b44b57a58fa12ed728
Added to database: 2/10/2026, 10:31:16 PM
Last enriched: 4/7/2026, 10:48:47 PM
Last updated: 5/22/2026, 7:12:22 PM
Views: 154
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.