Vulnerabilities (CVE)

Filtered by CWE-918
Total 1664 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-34711 2025-06-12 N/A 9.3 CRITICAL
GeoServer is an open source server that allows users to share and edit geospatial data. An improper URI validation vulnerability exists that enables an unauthorized attacker to perform XML External Entities (XEE) attack, then send GET request to any HTTP server. By default, GeoServer use PreventLocalEntityResolver class from GeoTools to filter out malicious URIs in XML entities before resolving them. The URI must match the regex (?i)(jar:file|http|vfs)[^?#;]*\\.xsd. But the regex leaves a chance for attackers to request to any HTTP server or limited file. Attacker can abuse this to scan internal networks and gain information about them then exploit further. GeoServer 2.25.0 and greater default to the use of ENTITY_RESOLUTION_ALLOWLIST and does not require you to provide a system property.
CVE-2025-30220 2025-06-12 N/A 9.9 CRITICAL
GeoServer is an open source server that allows users to share and edit geospatial data. GeoTools Schema class use of Eclipse XSD library to represent schema data structure is vulnerable to XML External Entity (XXE) exploit. This impacts whoever exposes XML processing with gt-xsd-core involved in parsing, when the documents carry a reference to an external XML schema. The gt-xsd-core Schemas class is not using the EntityResolver provided by the ParserHandler (if any was configured). This also impacts users of gt-wfs-ng DataStore where the ENTITY_RESOLVER connection parameter was not being used as intended. This vulnerability is fixed in GeoTools 33.1, 32.3, 31.7, and 28.6.1, GeoServer 2.27.1, 2.26.3, and 2.25.7, and GeoNetwork 4.4.8 and 4.2.13.
CVE-2024-40625 2025-06-12 N/A 5.5 MEDIUM
GeoServer is an open source server that allows users to share and edit geospatial data. The Coverage rest api /workspaces/{workspaceName}/coveragestores/{storeName}/{method}.{format} allows attackers to upload files with a specified url (with {method} equals 'url') with no restrict. This vulnerability is fixed in 2.26.0.
CVE-2025-49190 2025-06-12 N/A 4.3 MEDIUM
The application is vulnerable to Server-Side Request Forgery (SSRF). An endpoint can be used to send server internal requests to other ports.
CVE-2025-25065 1 Synacor 1 Zimbra Collaboration Suite 2025-06-11 N/A 5.3 MEDIUM
SSRF vulnerability in the RSS feed parser in Zimbra Collaboration 9.0.0 before Patch 43, 10.0.x before 10.0.12, and 10.1.x before 10.1.4 allows unauthorized redirection to internal network endpoints.
CVE-2023-6991 1 Surniaulula 1 Jsm File Get Contents\(\) Shortcode 2025-06-11 N/A 8.8 HIGH
The JSM file_get_contents() Shortcode WordPress plugin before 2.7.1 does not validate one of its shortcode's parameters before making a request to it, which could allow users with contributor role and above to perform SSRF attacks.
CVE-2024-6584 1 Automattic 1 Jetpack Boost 2025-06-11 N/A 9.1 CRITICAL
The 'wp_ajax_boost_proxy_ig' action allows administrators to make GET requests to arbitrary URLs.
CVE-2024-33117 1 Crmeb 1 Crmeb Java 2025-06-11 N/A 5.3 MEDIUM
crmeb_java v1.3.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the mergeList method in class com.zbkj.front.pub.ImageMergeController.
CVE-2024-48178 1 Newbee-mall Project 1 Newbee-mall 2025-06-10 N/A 8.1 HIGH
newbee-mall v1.0.0 is vulnerable to Server-Side Request Forgery (SSRF) via the goodsCoverImg parameter.
CVE-2025-5327 1 Chshcms 1 Mccms 2025-06-10 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in chshcms mccms 2.7. It has been classified as critical. This affects the function index of the file sys/apps/controllers/api/Gf.php. The manipulation of the argument pic leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-45479 1 Apache 1 Ranger 2025-06-10 N/A 9.1 CRITICAL
SSRF vulnerability in Edit Service Page of Apache Ranger UI in Apache Ranger Version 2.4.0. Users are recommended to upgrade to version Apache Ranger 2.5.0, which fixes this issue.
CVE-2024-25187 1 Xiaocheng-keji 1 71cms 2025-06-10 N/A 8.6 HIGH
Server Side Request Forgery (SSRF) vulnerability in 71cms v1.0.0, allows remote unauthenticated attackers to obtain sensitive information via getweather.html.
CVE-2024-22873 1 Tencent 1 Blueking Configuration Management Database 2025-06-09 N/A 8.1 HIGH
Tencent Blueking CMDB v3.2.x to v3.9.x was discovered to contain a Server-Side Request Forgery (SSRF) via the event subscription function (/service/subscription.go). This vulnerability allows attackers to access internal requests via a crafted POST request.
CVE-2025-5510 1 Quequnlong 1 Shiyi-blog 2025-06-09 6.5 MEDIUM 6.3 MEDIUM
A vulnerability classified as critical was found in quequnlong shiyi-blog up to 1.2.1. This vulnerability affects unknown code of the file /app/sys/article/optimize. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-30976 2025-06-06 N/A 4.9 MEDIUM
Server-Side Request Forgery (SSRF) vulnerability in wpdive Nexa Blocks allows Server Side Request Forgery. This issue affects Nexa Blocks: from n/a through 1.1.0.
CVE-2025-29008 2025-06-06 N/A 4.9 MEDIUM
Server-Side Request Forgery (SSRF) vulnerability in ShawonPro SocialMark allows Server Side Request Forgery. This issue affects SocialMark: from n/a through 2.0.7.
CVE-2025-30997 2025-06-06 N/A 5.4 MEDIUM
Server-Side Request Forgery (SSRF) vulnerability in SmartDataSoft Car Repair Services allows Server Side Request Forgery. This issue affects Car Repair Services: from n/a through 5.0.
CVE-2024-6155 1 Greenshiftwp 1 Greenshift - Animation And Page Builder Blocks 2025-06-05 N/A 6.4 MEDIUM
The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Authenticated (Subscriber+) Server-Side Request Forgery and Stored Cross Site Scripting in all versions up to, and including, 9.0.0 due to a missing capability check in the greenshift_download_file_localy function, along with no SSRF protection and sanitization on uploaded SVG files. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application that can also be leveraged to download malicious SVG files containing Cross-Site Scripting payloads to the server. On Cloud-based servers, attackers could retrieve the instance metadata. The issue was partially patched in version 8.9.9 and fully patched in version 9.0.1.
CVE-2023-35817 1 Devexpress 1 Devexpress 2025-06-05 N/A 5.0 MEDIUM
DevExpress before 23.1.3 allows AsyncDownloader SSRF.
CVE-2025-29972 1 Microsoft 1 Azure Storage Resource Provider 2025-06-05 N/A 9.9 CRITICAL
Server-Side Request Forgery (SSRF) in Azure allows an authorized attacker to perform spoofing over a network.