CVE-2025-54122

10.0 CRITICAL

📋 TL;DR

An unauthenticated Server-Side Request Forgery (SSRF) vulnerability in Manager accounting software allows attackers to make arbitrary HTTP requests from the vulnerable server. This bypasses network isolation and can expose internal services, cloud metadata, and sensitive data. All users running Manager Desktop or Server editions up to version 25.7.18.2519 are affected.

💻 Affected Systems

Products:
  • Manager Desktop
  • Manager Server
Versions: Up to and including 25.7.18.2519
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Both Desktop and Server editions are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network compromise: attacker accesses internal services, steals cloud credentials via metadata endpoints, exfiltrates sensitive data from isolated segments, and potentially pivots to other systems.

🟠

Likely Case

Data exfiltration from internal services accessible to the Manager server, exposure of cloud metadata, and reconnaissance of internal network services.

🟢

If Mitigated

Limited impact if network segmentation prevents access to sensitive internal services and cloud metadata endpoints are disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities are frequently weaponized. The unauthenticated nature and critical CVSS score make exploitation highly likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.7.21.2525

Vendor Advisory: https://github.com/Manager-io/Manager/security/advisories/GHSA-347w-cgwh-m895

Restart Required: Yes

Instructions:

1. Download Manager version 25.7.21.2525 or later from the official website. 2. Install the update following standard installation procedures. 3. Restart the Manager service or application.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound HTTP/HTTPS traffic from Manager servers to only necessary destinations using firewall rules.

Disable Proxy Handler

all

If the proxy handler functionality is not required, disable it in the application configuration.

🧯 If You Can't Patch

  • Implement strict network egress filtering to block Manager servers from accessing internal services and cloud metadata endpoints.
  • Deploy web application firewall (WAF) rules to detect and block SSRF patterns in incoming requests.

🔍 How to Verify

Check if Vulnerable:

Check the Manager version in the application's About or Help menu. If version is 25.7.18.2519 or earlier, the system is vulnerable.

Check Version:

Check application UI or configuration files for version information.

Verify Fix Applied:

After updating, verify the version shows 25.7.21.2525 or later in the About/Help menu.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from Manager server to internal IP ranges or cloud metadata endpoints
  • Multiple failed authentication attempts followed by proxy requests

Network Indicators:

  • HTTP requests from Manager server to internal services not normally accessed
  • Requests to cloud metadata endpoints (169.254.169.254, etc.)

SIEM Query:

source="manager-server" AND (dest_ip=169.254.169.254 OR dest_ip IN [RFC1918 ranges]) AND http_method=GET

🔗 References

📤 Share & Export