CVE-2025-8529

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in cloudfavorites favorites-web allows attackers to perform server-side request forgery (SSRF) attacks by manipulating the 'url' parameter in the getCollectLogoUrl function. Attackers can exploit this remotely to make the server send unauthorized requests to internal or external systems. All users running favorites-web versions up to 1.3.0 are affected.

💻 Affected Systems

Products:
  • cloudfavorites favorites-web
Versions: up to 1.3.0
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable function exposed are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or pivot to other systems within the network by making the vulnerable server send requests to internal resources.

🟠

Likely Case

Attackers will scan for and exploit this vulnerability to access metadata services, internal APIs, or perform port scanning of internal networks from the vulnerable server.

🟢

If Mitigated

With proper network segmentation and egress filtering, the impact is limited to the server itself and any directly accessible internal services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit has been publicly disclosed and requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.1 or later

Vendor Advisory: https://github.com/cloudfavorites/favorites-web/issues/134

Restart Required: Yes

Instructions:

1. Update to version 1.3.1 or later from the official repository. 2. Restart the application server. 3. Verify the fix by checking the version and testing the vulnerable endpoint.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement input validation to restrict URL parameters to allowed domains only

Implement URL whitelisting in the getCollectLogoUrl function

Network Segmentation

all

Restrict outbound network access from the vulnerable server

Configure firewall rules to block outbound HTTP/HTTPS from the application server except to required services

🧯 If You Can't Patch

  • Implement strict egress filtering to prevent the server from accessing internal network resources
  • Deploy a web application firewall (WAF) with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check if running favorites-web version 1.3.0 or earlier and if the getCollectLogoUrl endpoint is accessible

Check Version:

Check application configuration or build files for version information

Verify Fix Applied:

Verify version is 1.3.1 or later and test the vulnerable endpoint with SSRF payloads to confirm they are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from the application server
  • Requests to internal IP addresses or metadata services

Network Indicators:

  • HTTP requests from the application server to unexpected internal or external destinations

SIEM Query:

source_ip=application_server AND (dest_ip=169.254.169.254 OR dest_ip=metadata.google.internal OR dest_ip IN internal_ranges)

🔗 References

📤 Share & Export