CVE-2025-50234
BaseFortify
Publication date: 2025-08-06
Last updated on: 2025-08-18
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| chshcms | mccms | 2.7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Server-Side Request Forgery (SSRF) in MCCMS v2.7.0, specifically in the index() method of the sys\apps\controllers\api\Gf.php file. The vulnerability arises because the pic parameter is decrypted using a hard-coded key and then used to make a cURL request without proper security checks. An attacker can craft a malicious encrypted pic parameter that, when decrypted, points to internal addresses or local file paths. This allows the attacker to access internal services or local files on the server, such as sensitive configuration or log files, leading to information leakage or system exposure.
How can this vulnerability impact me? :
This vulnerability can lead to severe impacts including leakage of sensitive data by accessing internal services or local files, potential remote code execution, privilege escalation, and even full system compromise. It threatens the security and stability of the affected system by allowing attackers to read sensitive files or interact with internal network resources that should be protected.