CVE-2025-28089

9.1 CRITICAL

📋 TL;DR

This SSRF vulnerability in maccms10 allows attackers to make the server send unauthorized requests to internal systems via the Scheduled Task function. Attackers can potentially access internal services, scan internal networks, or interact with cloud metadata APIs. All users running vulnerable versions of maccms10 are affected.

💻 Affected Systems

Products:
  • maccms10
Versions: v2025.1000.4047 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with Scheduled Task functionality enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete internal network compromise via cloud metadata API access leading to credential theft, lateral movement, and data exfiltration.

🟠

Likely Case

Internal service enumeration, port scanning of internal systems, and potential data leakage from internal APIs.

🟢

If Mitigated

Limited to external resource interaction if proper network segmentation and egress filtering are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the Scheduled Task interface, which typically requires authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2025.1000.4048 or later

Vendor Advisory: https://github.com/magicblack/maccms10/releases/tag/v2025.1000.4047

Restart Required: No

Instructions:

1. Download latest version from GitHub releases. 2. Backup current installation. 3. Replace vulnerable files with patched version. 4. Verify functionality.

🔧 Temporary Workarounds

Disable Scheduled Tasks

all

Temporarily disable the Scheduled Task functionality to prevent exploitation.

# Edit maccms10 configuration to disable scheduled tasks
# Remove or comment out scheduled task execution in cron/automation

Network Egress Filtering

linux

Implement firewall rules to restrict outbound connections from the maccms10 server.

# Example iptables rule to restrict outbound HTTP/HTTPS
iptables -A OUTPUT -p tcp --dport 80 -j DROP
iptables -A OUTPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate maccms10 from internal systems
  • Deploy web application firewall with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check if maccms10 version is v2025.1000.4047 or earlier and Scheduled Task function is accessible.

Check Version:

Check maccms10 admin panel or version.php file for version information

Verify Fix Applied:

Verify version is v2025.1000.4048 or later and test Scheduled Task function with SSRF payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from maccms10 server
  • Scheduled task executions with external URLs
  • Requests to internal IP addresses or cloud metadata endpoints

Network Indicators:

  • HTTP requests from maccms10 server to internal network segments
  • Requests to 169.254.169.254 (AWS metadata) or similar cloud endpoints

SIEM Query:

source="maccms10" AND (url CONTAINS "http://internal" OR url CONTAINS "169.254.169.254")

🔗 References

📤 Share & Export