CVE-2025-15264
📋 TL;DR
This vulnerability allows attackers to perform Server-Side Request Forgery (SSRF) attacks against FeehiCMS installations up to version 2.1.1. By manipulating the 'src' parameter in the TimThumb component, attackers can force the server to make unauthorized requests to internal or external systems. This affects all FeehiCMS users running vulnerable versions with the TimThumb component accessible.
💻 Affected Systems
- FeehiCMS
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access internal services, exfiltrate sensitive data, or pivot to attack other internal systems by using the vulnerable server as a proxy.
Likely Case
Attackers scan for vulnerable instances and use them to probe internal networks, access metadata services, or interact with internal APIs.
If Mitigated
With proper network segmentation and egress filtering, impact is limited to the server itself making unauthorized outbound requests.
🎯 Exploit Status
Exploit has been publicly disclosed and requires minimal technical skill to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available, or implement workarounds.
🔧 Temporary Workarounds
Remove TimThumb file
linuxDelete or rename the vulnerable timthumb.php file to prevent exploitation
rm frontend/web/timthumb.php
mv frontend/web/timthumb.php frontend/web/timthumb.php.disabled
Block access via web server
allConfigure web server to deny access to timthumb.php
# Apache: Add to .htaccess
<Files "timthumb.php">
Order Allow,Deny
Deny from all
</Files>
# Nginx: Add to server block
location ~* /timthumb\.php$ {
deny all;
return 403;
}
🧯 If You Can't Patch
- Implement strict egress filtering to limit outbound connections from the server
- Deploy a WAF with SSRF protection rules to block malicious requests
🔍 How to Verify
Check if Vulnerable:
Check if file exists: ls -la frontend/web/timthumb.php
Check Version:
Check composer.json or version file in FeehiCMS installation directory
Verify Fix Applied:
Verify file is removed or inaccessible: curl -I https://yoursite.com/frontend/web/timthumb.php should return 404 or 403
📡 Detection & Monitoring
Log Indicators:
- Unusual requests to timthumb.php with external URLs in src parameter
- Outbound connections from web server to unexpected internal IPs
Network Indicators:
- HTTP requests with src parameter containing internal IP addresses or domains
- Web server making requests to metadata services (169.254.169.254)
SIEM Query:
web_access_logs | where url contains "timthumb.php" and url contains "src="