CVE-2025-60898

5.8 MEDIUM

📋 TL;DR

An unauthenticated SSRF vulnerability in Halo CMS 2.21 allows attackers to make the server send HTTP requests to arbitrary URLs, including internal network addresses. This can expose internal URLs through redirect responses. All Halo CMS 2.21 installations with the vulnerable thumbnail endpoint exposed are affected.

💻 Affected Systems

Products:
  • Halo CMS
Versions: 2.21
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the thumbnail via-uri endpoint to be accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker maps internal network, accesses internal services, potentially leading to data exfiltration or lateral movement within the network.

🟠

Likely Case

Information disclosure of internal URLs and network topology, possible limited internal service enumeration.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated exploitation via simple HTTP requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.21

Vendor Advisory: http://halo.com

Restart Required: No

Instructions:

1. Check current Halo CMS version. 2. Update to latest version beyond 2.21. 3. Verify the thumbnail endpoint validates URLs properly.

🔧 Temporary Workarounds

Disable thumbnail endpoint

all

Block or disable the vulnerable thumbnail via-uri endpoint.

Configure web server to block /api/content/thumbnails/via-uri endpoint

Network egress filtering

all

Restrict outbound HTTP requests from the Halo server to only necessary destinations.

Configure firewall to limit outbound HTTP/HTTPS from Halo server IP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Halo server from internal resources
  • Deploy web application firewall with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Test if /api/content/thumbnails/via-uri endpoint accepts arbitrary URLs and returns redirects with Location headers.

Check Version:

Check Halo CMS admin panel or version file for current version

Verify Fix Applied:

Confirm the endpoint now validates URLs against allow/blocklists and doesn't return internal URLs in redirects.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to thumbnail endpoint with external/internal URLs
  • Multiple 307 redirect responses

Network Indicators:

  • Outbound HTTP requests from Halo server to unusual internal/external IPs

SIEM Query:

source_ip=HALO_SERVER AND (uri_path="/api/content/thumbnails/via-uri" OR status_code=307)

🔗 References

📤 Share & Export