CVE-2025-28963
BaseFortify
Publication date: 2025-07-04
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Server Side Request Forgery (SSRF) in the Md Yeasin Ul Haider URL Shortener plugin (versions up to 3.0.7). It allows an unauthenticated attacker to make the affected website perform HTTP requests to arbitrary domains controlled by the attacker. This means the attacker can trick the server into sending requests on their behalf to other internal or external systems. [1]
How can this vulnerability impact me? :
Exploitation of this vulnerability can potentially expose sensitive information from other services running on the same system as the URL Shortener plugin. Although the severity is considered low (CVSS 5.4), an attacker could use it to access internal resources or data that should not be publicly accessible. There is no official patch yet, so users should consider virtual patching or professional incident response if compromise is suspected. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this SSRF vulnerability involves monitoring for unusual HTTP requests originating from the affected URL Shortener plugin to arbitrary external domains. Since no specific detection commands are provided, it is recommended to use server-side malware scanning and professional incident response services to identify potential exploitation. Plugin-based malware scanners may be unreliable for this purpose. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying virtual patching (vPatching) solutions provided by Patchstack to automatically protect against exploitation in the absence of an official fix. Additionally, monitoring and restricting outbound HTTP requests from the plugin, seeking professional incident response, and performing server-side malware scanning are advised. [1]