CVE-2025-67427
📋 TL;DR
A Blind Server-Side Request Forgery vulnerability in evershop allows unauthenticated attackers to force the server to make HTTP requests to arbitrary internal or external systems. This affects evershop 2.1.0 and earlier versions, potentially exposing internal network resources or enabling further attacks.
💻 Affected Systems
- evershop
📦 What is this software?
Evershop by Evershop
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access internal services, exfiltrate sensitive data, or chain with other vulnerabilities to achieve remote code execution.
Likely Case
Information disclosure from internal services, port scanning of internal networks, or abuse of server resources for external attacks.
If Mitigated
Limited to denial-of-service via resource exhaustion or failed connection attempts.
🎯 Exploit Status
Simple HTTP request manipulation required; public proof-of-concept available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: https://github.com/evershopcommerce/evershop
Restart Required: No
Instructions:
Check evershop GitHub repository for security updates; no official patch currently available.
🔧 Temporary Workarounds
Input Validation Filter
allImplement strict validation of the 'src' parameter to only allow local file paths or trusted domains.
Modify /images API endpoint code to validate input
Network Segmentation
allRestrict outbound network access from evershop servers to only necessary services.
Configure firewall rules to block unnecessary outbound connections
🧯 If You Can't Patch
- Implement Web Application Firewall (WAF) rules to block SSRF patterns
- Disable or restrict access to the vulnerable /images API endpoint
🔍 How to Verify
Check if Vulnerable:
Test by sending a request to /images?src=http://internal-service and observing if the server attempts the connection.
Check Version:
Check evershop package.json or version file for version number
Verify Fix Applied:
Verify that the same test request is rejected or properly validated.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from server
- Multiple failed connection attempts to internal IPs
Network Indicators:
- Server making unexpected HTTP requests to internal networks
SIEM Query:
source_ip=evershop_server AND dest_ip=internal_range AND protocol=HTTP