CVE-2025-46651

4.3 MEDIUM

📋 TL;DR

Tiny File Manager versions up to 2.6 contain a server-side request forgery (SSRF) vulnerability in the URL upload feature. Attackers can bypass URL validation using specially crafted domain names like http://www.127.0.0.1.example.com/ to make requests to localhost/internal services. This affects any system running vulnerable Tiny File Manager instances, potentially exposing internal network services.

💻 Affected Systems

Products:
  • Tiny File Manager
Versions: through 2.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with URL upload feature enabled. The vulnerability is in the core file upload functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full internal network reconnaissance, unauthorized access to internal services (databases, admin panels), data exfiltration, or lateral movement within the network.

🟠

Likely Case

Port scanning of internal services, limited data exposure from vulnerable internal endpoints, potential for further exploitation if vulnerable internal services exist.

🟢

If Mitigated

Limited to port scanning capabilities with no data access if internal services are properly secured with authentication.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the file upload feature. Public proof-of-concept demonstrates the bypass technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.1 or later

Vendor Advisory: https://github.com/RobertoLuzanilla/tinyfilemanager-security-advisories/blob/main/CVE-2025-46651.md

Restart Required: No

Instructions:

1. Download latest version from official repository. 2. Replace vulnerable tinyfilemanager.php file. 3. Verify URL validation improvements in upload functionality.

🔧 Temporary Workarounds

Disable URL Upload Feature

all

Remove or disable the URL upload functionality in the configuration

Edit config.php and set 'upload_url' to false or remove URL upload UI elements

Network Segmentation

linux

Restrict Tiny File Manager's network access to prevent SSRF exploitation

iptables -A OUTPUT -p tcp -d 127.0.0.0/8 -j DROP
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="127.0.0.0/8" drop'

🧯 If You Can't Patch

  • Implement strict network egress filtering to block outbound connections to localhost/127.0.0.0/8
  • Deploy a web application firewall (WAF) with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Test URL upload with crafted domain like http://www.127.0.0.1.example.com/ and monitor if request reaches localhost

Check Version:

grep "define.*VERSION" tinyfilemanager.php

Verify Fix Applied:

Attempt same SSRF bypass after patch - should be blocked with proper URL validation

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL upload attempts with localhost/127.0.0.1 variations
  • Multiple failed upload attempts from single IP

Network Indicators:

  • Outbound connections from web server to localhost/127.0.0.1 on unusual ports
  • Port scanning patterns from web server

SIEM Query:

source="web_logs" AND (url CONTAINS "127.0.0.1" OR url CONTAINS "localhost") AND action="upload"

🔗 References

📤 Share & Export