CVE-2025-14008
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-04

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in dayrui XunRuiCMS up to 4.7.1. This vulnerability affects unknown code of the file admin79f2ec220c7e.php?c=api&m=test_site_domain of the component Project Domain Change Test. This manipulation of the argument v causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-04
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
xunruicms xunruicms to 4.7.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a server-side request forgery (SSRF) flaw found in dayrui XunRuiCMS up to version 4.7.1. It occurs in the component Project Domain Change Test, specifically in the file admin79f2ec220c7e.php when manipulating the argument 'v'. An attacker can remotely exploit this flaw to make the server perform unauthorized requests.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to make the server send unauthorized requests, potentially accessing internal systems or sensitive information. This can lead to information disclosure, integrity issues, and availability problems on the affected system.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can be performed by monitoring for unusual or unauthorized requests to the vulnerable endpoint `admin79f2ec220c7e.php?c=api&m=test_site_domain` with manipulation of the parameter `v`. Since the vulnerability involves SSRF, network logs or web server access logs can be inspected for suspicious requests targeting this endpoint. Additionally, reviewing authentication logs for enhanced privilege usage may help. Specific commands are not provided in the resources, but typical approaches include using tools like curl or wget to test the endpoint, or grep commands to search logs for the vulnerable URL pattern. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

No known mitigation or patch is available from the vendor as they did not respond to the disclosure. The recommended immediate step is to consider replacing the affected product (dayrui XunRuiCMS versions up to 4.7.1). Until a fix is available, restricting access to the vulnerable endpoint, applying network-level controls to limit outbound requests from the server, and monitoring for exploitation attempts are advisable. [3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart