CVE-2025-14008
📋 TL;DR
This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in dayrui XunRuiCMS up to version 4.7.1. Attackers can exploit this by manipulating the 'v' parameter in the admin79f2ec220c7e.php file to make the server send unauthorized requests to internal or external systems. Organizations using vulnerable versions of XunRuiCMS with the Project Domain Change Test component are affected.
💻 Affected Systems
- dayrui XunRuiCMS
📦 What is this software?
Xunruicms by Xunruicms
⚠️ Risk & Real-World Impact
Worst Case
Attackers could use the vulnerable server as a proxy to scan internal networks, access internal services, or perform data exfiltration from systems that shouldn't be internet-accessible.
Likely Case
Attackers will typically use this to probe internal networks, access metadata services, or interact with internal APIs that trust the vulnerable server.
If Mitigated
With proper network segmentation and egress filtering, the impact is limited to the server itself making unauthorized outbound requests.
🎯 Exploit Status
Exploit details are publicly available on GitHub. The vulnerability requires admin access to reach the vulnerable endpoint, but once accessed, exploitation is straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch is available. The vendor did not respond to disclosure. Consider upgrading to any version above 4.7.1 if available, or apply workarounds.
🔧 Temporary Workarounds
Remove vulnerable file
linuxDelete or rename the vulnerable admin79f2ec220c7e.php file to prevent access
mv /path/to/admin79f2ec220c7e.php /path/to/admin79f2ec220c7e.php.disabled
Restrict access via web server
allConfigure web server to block access to the vulnerable endpoint
# Apache: <LocationMatch "admin79f2ec220c7e\.php\?c=api&m=test_site_domain">
Order deny,allow
Deny from all
</LocationMatch>
# Nginx: location ~* admin79f2ec220c7e\.php\?c=api&m=test_site_domain { deny all; }
🧯 If You Can't Patch
- Implement strict network egress filtering to limit outbound connections from the web server
- Deploy a Web Application Firewall (WAF) with SSRF protection rules
🔍 How to Verify
Check if Vulnerable:
Check if admin79f2ec220c7e.php exists and is accessible with parameters c=api&m=test_site_domain&v=[test_url]
Check Version:
Check XunRuiCMS version in system configuration or admin panel
Verify Fix Applied:
Attempt to access the vulnerable endpoint and verify it returns 403/404 or the file no longer exists
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to admin79f2ec220c7e.php with c=api&m=test_site_domain parameters
- Unusual outbound connections from web server to internal IPs or unusual domains
Network Indicators:
- Web server making unexpected HTTP requests to internal network ranges or external domains
SIEM Query:
source="web_server_logs" AND uri="*admin79f2ec220c7e.php*" AND query="*c=api&m=test_site_domain*"