CVE-2025-15264
Unknown Unknown - Not Provided
Server-Side Request Forgery in FeehiCMS TimThumb Component

Publication date: 2025-12-30

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was determined in FeehiCMS up to 2.1.1. Impacted is an unknown function of the file frontend/web/timthumb.php of the component TimThumb. Executing manipulation of the argument src can lead to server-side request forgery. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
timthumb timthumb 2.8.13
feehi feehi_cms 2.1.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-15264 is a server-side request forgery (SSRF) vulnerability in FeehiCMS up to version 2.1.1, specifically in the TimThumb component located in frontend/web/timthumb.php. The vulnerability occurs because the "src" argument is improperly handled, allowing an attacker to manipulate it to make the server send unauthorized requests to arbitrary URLs. This can be done remotely without authentication. The TimThumb configuration allows unrestricted fetching of images from any external URL without domain whitelisting, enabling attackers to perform SSRF attacks such as internal port scanning or fetching arbitrary external resources. [1, 2]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to make your server perform unauthorized HTTP requests to arbitrary URLs, potentially leading to internal network reconnaissance, unauthorized data access, and exploitation of internal services. It affects the confidentiality, integrity, and availability of your system. Attackers can scan internal ports, access internal resources, or fetch malicious content through your server, which can be leveraged for further attacks. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of the vulnerable TimThumb script and testing its behavior. One method is to use Google dorking to find vulnerable endpoints, e.g., searching for "inurl:frontend/web/timthumb.php". On your system, you can test the vulnerability by sending crafted HTTP requests to the timthumb.php script with manipulated src parameters. For example, using curl to request an internal port scan: curl "http://your-target/frontend/web/timthumb.php?src=http://127.0.0.1:3306/" and observing error messages indicating connection attempts. Another test is fetching an external image: curl "http://your-target/frontend/web/timthumb.php?src=http://httpbin.org/image/jpeg&w=200&h=200" to see if the server fetches external resources. Additionally, using a DNSLog service, you can send a request with a src URL pointing to a DNSLog subdomain and check if the DNS query is recorded, confirming SSRF. These commands help confirm if the server is vulnerable to SSRF via the timthumb.php script. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Disable external URL fetching in the timthumb.php file by setting define('ALLOW_EXTERNAL', FALSE); 2) If external fetching is required, enable domain whitelisting by setting define('ALLOW_EXTERNAL', TRUE); define('ALLOW_ALL_EXTERNAL_SITES', false); and specifying trusted domains in the $ALLOWED_SITES array; 3) Replace the vulnerable TimThumb component with a modern, secure image processing library that enforces proper security controls. Since no vendor patch is available, these configuration changes or removal of TimThumb are recommended to prevent exploitation. [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to perform server-side request forgery (SSRF), potentially leading to unauthorized internal network access and data exposure. This can impact the confidentiality, integrity, and availability of sensitive data, which may result in non-compliance with data protection regulations such as GDPR and HIPAA that require safeguarding personal and sensitive information. However, specific compliance impacts are not detailed in the provided resources. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart