Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25870: CWE-918 Server-Side Request Forgery (SSRF) in doramart DoraCMS

0
Medium
VulnerabilityCVE-2026-25870cvecve-2026-25870cwe-918
Published: Tue Feb 10 2026 (02/10/2026, 22:16:28 UTC)
Source: CVE Database V5
Vendor/Project: doramart
Product: DoraCMS

Description

DoraCMS version 3.1 and prior contains a server-side request forgery (SSRF) vulnerability in its UEditor remote image fetch functionality. The application accepts user-supplied URLs and performs server-side HTTP or HTTPS requests without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal or private IP address ranges, or apply request timeouts or response size limits. An attacker can abuse this behavior to induce the server to issue outbound requests to arbitrary hosts, including internal network resources, potentially enabling internal network scanning and denial of service through resource exhaustion.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/07/2026, 22:48:47 UTC

Technical Analysis

CVE-2026-25870 is a server-side request forgery (SSRF) vulnerability affecting DoraCMS version 3.1 and prior. It exists in the UEditor remote image fetch functionality, where user-supplied URLs are fetched by the server without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal/private IP addresses, or apply request timeouts or response size limits. This allows attackers to induce the server to make HTTP/HTTPS requests to arbitrary hosts, including internal network resources, potentially enabling internal network reconnaissance and denial of service through resource exhaustion. The vulnerability has a CVSS 4.0 score of 6.9 (medium severity). There is no vendor advisory or patch information available at this time.

Potential Impact

An attacker can exploit this SSRF vulnerability to cause the DoraCMS server to make unauthorized HTTP/HTTPS requests to arbitrary external or internal network hosts. This can lead to internal network scanning, potentially exposing sensitive internal services. Additionally, the lack of request timeouts and response size limits may allow denial of service conditions via resource exhaustion on the server. There are no known exploits in the wild reported. The vulnerability is rated medium severity with a CVSS 4.0 score of 6.9.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, users should consider disabling or restricting the UEditor remote image fetch functionality to prevent untrusted URL inputs. Implementing network-level controls to restrict outbound HTTP/HTTPS requests from the server to trusted destinations may help mitigate risk. Monitor vendor channels for updates regarding patches or official mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-06T19:12:03.464Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698bb1b44b57a58fa12ed728

Added to database: 2/10/2026, 10:31:16 PM

Last enriched: 4/7/2026, 10:48:47 PM

Last updated: 5/22/2026, 7:12:22 PM

Views: 154

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses