CVE-2025-46651
SSRF Vulnerability in Tiny File Manager URL Upload Allows Internal Access
Publication date: 2026-02-03
Last updated on: 2026-02-10
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| prasathmani | tiny_file_manager | to 2.6 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Tiny File Manager versions up to 2.6 and is a server-side request forgery (SSRF) issue in the URL upload feature.
Because the application does not properly validate user-supplied URLs, an attacker can craft requests that appear to target external domains but actually resolve to localhost or internal network addresses using specially constructed domain names like http://www.127.0.0.1.example.com/.
This allows the attacker to send unauthorized requests to internal services that are normally inaccessible from outside, potentially leading to unauthorized port scanning or access to internal-only services.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to perform unauthorized actions within your internal network by exploiting the SSRF flaw.
- Unauthorized port scanning of internal services, which can reveal sensitive information about your network configuration.
- Access to internal-only services that are not intended to be exposed externally, potentially leading to data exposure or further exploitation.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in Tiny File Manager allows an attacker to perform server-side request forgery (SSRF) via the URL upload feature, potentially leading to unauthorized port scanning or access to internal-only services.
Such unauthorized access or internal network scanning could lead to exposure of sensitive data or systems, which may impact compliance with standards and regulations like GDPR or HIPAA that require protection of personal and sensitive information.
However, the provided information does not explicitly detail the direct compliance impact or specific regulatory consequences of this vulnerability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'The vulnerability involves server-side request forgery (SSRF) through the URL upload feature in Tiny File Manager. Detection can focus on monitoring for unusual HTTP requests that attempt to access localhost or internal services using crafted domain names like http://www.127.0.0.1.example.com/.'}, {'type': 'paragraph', 'content': 'You can detect potential exploitation attempts by inspecting web server logs for suspicious URL patterns or by using network monitoring tools to identify requests targeting internal IP addresses or localhost via unusual hostnames.'}, {'type': 'paragraph', 'content': 'Example commands to help detect such activity include:'}, {'type': 'list_item', 'content': "Using grep to find suspicious URLs in web server logs: grep -i '127.0.0.1' /var/log/apache2/access.log"}, {'type': 'list_item', 'content': "Using tcpdump to monitor HTTP traffic to localhost or internal IPs: sudo tcpdump -i any 'tcp port 80 and (dst host 127.0.0.1 or dst net 192.168.0.0/16)'"}, {'type': 'list_item', 'content': 'Using curl or wget to test the URL upload feature with crafted URLs to see if SSRF is possible.'}] [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disabling or restricting the URL upload feature in Tiny File Manager to prevent attackers from submitting crafted URLs.
Additionally, implement strict validation and sanitization of user-supplied URLs to block requests that resolve to localhost or internal IP addresses.
Network-level protections such as firewall rules can be applied to block outgoing HTTP requests from the application server to internal services or localhost.
Finally, monitor for updates or patches from the Tiny File Manager project and apply them as soon as they become available.