CVE-2025-67427
BaseFortify
Publication date: 2026-01-05
Last updated on: 2026-01-12
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| evershop | evershop | to 2.1.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Blind Server-Side Request Forgery (SSRF) in evershop version 2.1.0 and earlier. It allows unauthenticated attackers to make the server send HTTP requests by exploiting the "GET /images" API. The issue arises because the "src" query parameter is not properly validated, letting attackers specify arbitrary HTTP or HTTPS URLs. This can cause the server to make unexpected requests to internal or external networks.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to make the server perform unauthorized HTTP requests. This can lead to information disclosure about internal network resources, potential access to sensitive data, or interaction with internal services that are not normally exposed externally. It may also be used as a stepping stone for further attacks within the network.