CVE-2025-28963
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-07-04

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Server-Side Request Forgery (SSRF) vulnerability in Md Yeasin Ul Haider URL Shortener exact-links allows Server Side Request Forgery.This issue affects URL Shortener: from n/a through <= 3.0.7.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-04
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2025-07-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Server Side Request Forgery (SSRF) in the Md Yeasin Ul Haider URL Shortener plugin (versions up to 3.0.7). It allows an unauthenticated attacker to make the affected website perform HTTP requests to arbitrary domains controlled by the attacker. This means the attacker can trick the server into sending requests on their behalf to other internal or external systems. [1]


How can this vulnerability impact me? :

Exploitation of this vulnerability can potentially expose sensitive information from other services running on the same system as the URL Shortener plugin. Although the severity is considered low (CVSS 5.4), an attacker could use it to access internal resources or data that should not be publicly accessible. There is no official patch yet, so users should consider virtual patching or professional incident response if compromise is suspected. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this SSRF vulnerability involves monitoring for unusual HTTP requests originating from the affected URL Shortener plugin to arbitrary external domains. Since no specific detection commands are provided, it is recommended to use server-side malware scanning and professional incident response services to identify potential exploitation. Plugin-based malware scanners may be unreliable for this purpose. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying virtual patching (vPatching) solutions provided by Patchstack to automatically protect against exploitation in the absence of an official fix. Additionally, monitoring and restricting outbound HTTP requests from the plugin, seeking professional incident response, and performing server-side malware scanning are advised. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart