CVE-2025-15373
📋 TL;DR
This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in EyouCMS versions up to 1.7.7. Attackers can exploit the saveRemote function in application/function.php to make the server send unauthorized requests to internal or external systems. All users running affected EyouCMS versions are vulnerable to this remote attack.
💻 Affected Systems
- EyouCMS
📦 What is this software?
Eyoucms by Eyoucms
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access internal services, exfiltrate sensitive data, or pivot to other systems by making the vulnerable server proxy requests to internal network resources.
Likely Case
Attackers will scan for vulnerable instances and use them to probe internal networks, access metadata services, or interact with internal APIs to gather information.
If Mitigated
With proper network segmentation and egress filtering, the impact is limited to unsuccessful external requests or access to non-sensitive internal endpoints.
🎯 Exploit Status
Public proof-of-concept exists, making exploitation straightforward for attackers with basic skills.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.7.8
Vendor Advisory: Not provided in references
Restart Required: No
Instructions:
1. Backup your current installation. 2. Download EyouCMS version 1.7.8 from the official source. 3. Replace the vulnerable application/function.php file with the patched version. 4. Verify the fix by checking the saveRemote function implementation.
🔧 Temporary Workarounds
Disable vulnerable function
allTemporarily disable or restrict access to the saveRemote function
# Add access control or comment out function in application/function.php
Network egress filtering
linuxRestrict outbound connections from the web server to only necessary destinations
# Configure firewall rules to limit outbound HTTP/HTTPS from web server
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the vulnerable server from internal resources
- Deploy a web application firewall (WAF) with SSRF protection rules
🔍 How to Verify
Check if Vulnerable:
Check if your EyouCMS version is 1.7.7 or earlier by examining the version file or admin panel
Check Version:
Check admin panel or look for version information in configuration files
Verify Fix Applied:
Verify the application/function.php file has been updated to version 1.7.8 or check that the saveRemote function includes proper URL validation
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from web server process
- Requests to internal IP addresses or metadata services from web server
Network Indicators:
- Web server making unexpected outbound connections to unusual destinations
- HTTP requests to internal network ranges from external-facing server
SIEM Query:
source="web_server_logs" AND (dest_ip IN internal_ranges OR dest_host LIKE "*.internal" OR dest_host="169.254.169.254")
🔗 References
- https://note-hxlab.wetolink.com/share/DeUFyoSjsPPK
- https://note-hxlab.wetolink.com/share/DeUFyoSjsPPK#-span--strong-proof-of-concept---strong---span-
- https://vuldb.com/?ctiid.339081
- https://vuldb.com/?id.339081
- https://vuldb.com/?submit.718465
- https://note-hxlab.wetolink.com/share/DeUFyoSjsPPK
- https://note-hxlab.wetolink.com/share/DeUFyoSjsPPK#-span--strong-proof-of-concept---strong---span-