CVE-2025-13872

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to perform blind Server-Side Request Forgery (SSRF) attacks through the survey-import feature of ObjectPlanet Opinio. Attackers can force the server to make HTTP GET requests to arbitrary internal or external destinations. Organizations running vulnerable versions of ObjectPlanet Opinio on web platforms are affected.

💻 Affected Systems

Products:
  • ObjectPlanet Opinio
Versions: 7.26 rev12562
Operating Systems: All platforms running the web application
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web-based platform with survey-import feature enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or pivot to internal networks by making the server request internal resources.

🟠

Likely Case

Information disclosure from internal services, reconnaissance of internal network structure, or potential data exfiltration.

🟢

If Mitigated

Limited impact if network segmentation restricts server outbound connections and internal service access.

🌐 Internet-Facing: HIGH - Web applications with this vulnerability are directly exposed to external attackers.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this to access other internal services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires access to the survey-import feature, but exploitation is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor changelog for fixed version

Vendor Advisory: https://www.objectplanet.com/opinio/changelog.html

Restart Required: Yes

Instructions:

1. Check the vendor changelog for the fixed version
2. Download and install the latest version from ObjectPlanet
3. Restart the Opinio application service
4. Verify the fix by testing the survey-import feature

🔧 Temporary Workarounds

Disable survey-import feature

all

Temporarily disable the vulnerable survey-import functionality

Modify application configuration to disable import features

Network egress filtering

all

Restrict outbound HTTP requests from the Opinio server

Configure firewall rules to limit server outbound connections

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Opinio server from internal resources
  • Deploy a web application firewall (WAF) with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Test if the survey-import feature accepts URLs to internal services or external domains

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Attempt to trigger SSRF through survey-import and verify requests are blocked or validated

📡 Detection & Monitoring

Log Indicators:

  • Unusual import requests with external URLs
  • Multiple failed import attempts
  • Requests to internal IP addresses from the Opinio server

Network Indicators:

  • Outbound HTTP requests from Opinio server to unusual destinations
  • Requests to internal services from the application server

SIEM Query:

source="opinio_logs" AND (url_import OR survey_import) AND (contains("http://") OR contains("https://"))

🔗 References

📤 Share & Export