Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25870: CWE-918 Server-Side Request Forgery (SSRF) in doramart DoraCMS

0
Medium
VulnerabilityCVE-2026-25870cvecve-2026-25870cwe-918
Published: Tue Feb 10 2026 (02/10/2026, 22:16:28 UTC)
Source: CVE Database V5
Vendor/Project: doramart
Product: DoraCMS

Description

DoraCMS version 3.1 and prior contains a server-side request forgery (SSRF) vulnerability in its UEditor remote image fetch functionality. The application accepts user-supplied URLs and performs server-side HTTP or HTTPS requests without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal or private IP address ranges, or apply request timeouts or response size limits. An attacker can abuse this behavior to induce the server to issue outbound requests to arbitrary hosts, including internal network resources, potentially enabling internal network scanning and denial of service through resource exhaustion.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:24:07 UTC

Technical Analysis

CVE-2026-25870 is a server-side request forgery (SSRF) vulnerability identified in DoraCMS version 3.1 and earlier, specifically within the UEditor remote image fetch functionality. This feature allows users to supply URLs for the server to fetch images remotely. However, the implementation lacks sufficient validation mechanisms: it does not enforce allowlists of permitted domains, nor does it block requests to internal or private IP address ranges (such as 10.x.x.x, 192.168.x.x, or 127.0.0.1). Additionally, it does not impose request timeouts or response size limits, increasing the risk of resource exhaustion. An attacker can exploit this by submitting crafted URLs that cause the server to send HTTP or HTTPS requests to arbitrary hosts, including internal network devices or services not normally exposed externally. This can facilitate internal network scanning, potentially revealing sensitive infrastructure details, and can also be leveraged to cause denial of service by exhausting server resources through large or slow responses. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. Although no public exploits have been reported yet, the medium CVSS score of 6.9 reflects the moderate risk posed by this vulnerability due to its potential impact on confidentiality and availability. The vulnerability is tracked under CWE-918 (SSRF) and was published on February 10, 2026. No patches or official fixes have been linked yet, emphasizing the need for immediate mitigation by administrators.

Potential Impact

The impact of CVE-2026-25870 on organizations using DoraCMS can be significant. By exploiting this SSRF vulnerability, attackers can bypass perimeter defenses and access internal network resources that are otherwise inaccessible from the internet. This can lead to unauthorized internal network reconnaissance, exposing sensitive systems, services, and data. Attackers may leverage this information for further attacks such as lateral movement, privilege escalation, or data exfiltration. Additionally, the lack of request timeouts and response size limits can be abused to launch denial of service attacks against the DoraCMS server itself or internal services by causing resource exhaustion. This can degrade service availability and disrupt business operations. Since the vulnerability requires no authentication or user interaction, it can be exploited by unauthenticated remote attackers, increasing the threat surface. Organizations relying on DoraCMS for content management, especially those hosting sensitive or critical web applications, face increased risk of compromise, data leakage, and operational disruption if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2026-25870, organizations should implement the following specific measures: 1) Apply strict input validation on URLs accepted by the UEditor remote image fetch feature, enforcing allowlists of trusted domains and rejecting all others. 2) Implement network-level restrictions to block outbound HTTP/HTTPS requests from the DoraCMS server to internal or private IP address ranges, preventing SSRF from reaching internal resources. 3) Introduce request timeouts and response size limits to avoid resource exhaustion from slow or large responses. 4) Monitor and log outbound requests initiated by the CMS to detect anomalous or suspicious activity indicative of SSRF exploitation attempts. 5) If possible, disable or restrict the remote image fetch functionality until a vendor patch or update is available. 6) Keep DoraCMS installations updated and subscribe to vendor security advisories for forthcoming patches. 7) Employ web application firewalls (WAFs) with SSRF detection rules to block malicious requests targeting this vulnerability. 8) Conduct internal network segmentation to limit the exposure of critical services to the CMS server. These targeted mitigations go beyond generic advice by focusing on controlling the vulnerable feature's behavior and limiting the server's ability to reach unintended destinations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-06T19:12:03.464Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698bb1b44b57a58fa12ed728

Added to database: 2/10/2026, 10:31:16 PM

Last enriched: 3/5/2026, 9:24:07 AM

Last updated: 4/7/2026, 2:23:38 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses