CVE-2025-57055
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-09-23
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wondercms | wondercms | 3.5.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Server-Side Request Forgery (SSRF) in WonderCMS 3.5.0. It occurs in the custom module installation feature where an authenticated administrator can provide a malicious URL via the pluginThemeUrl POST parameter. The server then fetches this URL using curl_exec() without proper validation, allowing the attacker to make the server perform unintended HTTP requests to internal or external systems.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to make the server send unauthorized HTTP requests to internal or external systems. This can lead to unauthorized access to internal resources, data exposure, or interaction with internal services that are not normally accessible from outside, potentially leading to further exploitation or data breaches.