CVE-2025-45474

7.3 HIGH

📋 TL;DR

CVE-2025-45474 is a Server-Side Request Forgery (SSRF) vulnerability in maccms10's email settings functionality. Attackers can exploit this to make unauthorized requests from the vulnerable server to internal or external systems. This affects all administrators who can access the email settings interface in vulnerable versions.

💻 Affected Systems

Products:
  • maccms10
Versions: v2025.1000.4047
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative access to email settings interface. The vulnerability exists in the email configuration functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could pivot to internal networks, access cloud metadata services, perform port scanning, or interact with internal APIs to steal sensitive data or achieve remote code execution.

🟠

Likely Case

Attackers will typically scan internal networks, access internal web applications, or interact with cloud metadata services to obtain credentials and escalate access.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact is limited to denial of service or limited information disclosure from the vulnerable server itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative access. The referenced documentation shows proof-of-concept details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.yuque.com/morysummer/vx41bz/ptnnp4eema601rvz

Restart Required: No

Instructions:

No official patch available. Monitor vendor channels for updates. Consider workarounds or alternative software.

🔧 Temporary Workarounds

Input Validation and Whitelisting

all

Implement strict input validation for email server configuration fields to only allow legitimate email server hostnames/IPs.

Network Egress Filtering

all

Configure firewall rules to restrict outbound connections from the web server to only necessary services (SMTP, DNS, etc.).

🧯 If You Can't Patch

  • Restrict administrative access to email settings using IP whitelisting or additional authentication factors.
  • Implement a web application firewall (WAF) with SSRF protection rules to block malicious requests.

🔍 How to Verify

Check if Vulnerable:

Check if you can configure email settings with arbitrary URLs or IP addresses that trigger outbound requests from the server.

Check Version:

Check maccms10 version in admin panel or configuration files.

Verify Fix Applied:

Test if email configuration rejects invalid URLs/IPs and only allows legitimate email server addresses.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP/HTTPS requests from web server to internal IP ranges or metadata services
  • Multiple failed email configuration attempts with unusual hostnames

Network Indicators:

  • Web server making unexpected requests to internal services, cloud metadata endpoints (169.254.169.254), or unusual external domains

SIEM Query:

source="web_server_logs" AND (url CONTAINS "169.254.169.254" OR url CONTAINS "localhost" OR url CONTAINS "127.0.0.1" OR url CONTAINS "internal_ip")

🔗 References

📤 Share & Export