CVE-2025-52362

9.1 CRITICAL

📋 TL;DR

This SSRF vulnerability in PHProxy allows attackers to bypass URL validation and make unauthorized requests to internal systems. Remote unauthenticated attackers can exploit this to access internal services. All users running PHProxy version 1.1.1 or earlier are affected.

💻 Affected Systems

Products:
  • PHProxy
Versions: 1.1.1 and prior
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with default configuration are vulnerable. The vulnerability is in the core URL processing functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker accesses sensitive internal systems, exfiltrates data, or performs lateral movement within the network.

🟠

Likely Case

Attacker scans internal networks, accesses internal web services, or uses the proxy to attack other systems.

🟢

If Mitigated

Limited to port scanning or accessing non-sensitive internal services if proper network segmentation exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists in the GitHub gist reference. Exploitation requires only HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch exists. Consider workarounds or alternative software.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Add strict validation for the _proxurl parameter to reject internal IP addresses and localhost URLs

Modify PHProxy source code to validate URLs against internal IP ranges (127.0.0.0/8, 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16)

Network Access Control

linux

Restrict PHProxy's outbound network access using firewall rules

iptables -A OUTPUT -p tcp -m owner --uid-owner phproxy -d 127.0.0.0/8 -j DROP
iptables -A OUTPUT -p tcp -m owner --uid-owner phproxy -d 10.0.0.0/8 -j DROP
iptables -A OUTPUT -p tcp -m owner --uid-owner phproxy -d 172.16.0.0/12 -j DROP
iptables -A OUTPUT -p tcp -m owner --uid-owner phproxy -d 192.168.0.0/16 -j DROP

🧯 If You Can't Patch

  • Disable or remove PHProxy from internet-facing systems immediately
  • Implement strict network segmentation to isolate PHProxy from sensitive internal systems

🔍 How to Verify

Check if Vulnerable:

Test by attempting to proxy requests to internal IP addresses (127.0.0.1, 192.168.1.1) using the _proxurl parameter

Check Version:

Check PHProxy version in source code or configuration files

Verify Fix Applied:

Verify that internal IP requests are rejected and only external URLs are processed

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns in access logs
  • Requests to internal IP addresses from PHProxy
  • Multiple failed validation attempts

Network Indicators:

  • Outbound connections from PHProxy to internal IP ranges
  • Unusual traffic patterns from PHProxy server

SIEM Query:

source="phproxy.log" AND (url="*127.0.0.1*" OR url="*192.168.*" OR url="*10.*" OR url="*172.16.*")

🔗 References

📤 Share & Export