CVE-2025-8675

8.8 HIGH

📋 TL;DR

This Server-Side Request Forgery (SSRF) vulnerability in Drupal's AI SEO Link Advisor module allows attackers to make unauthorized requests from the server to internal or external systems. It affects all Drupal sites using AI SEO Link Advisor versions before 1.0.6. Attackers could potentially access internal services, perform port scanning, or interact with cloud metadata services.

💻 Affected Systems

Products:
  • Drupal AI SEO Link Advisor
Versions: 0.0.0 through 1.0.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal sites with the AI SEO Link Advisor module installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, cloud metadata (potentially obtaining credentials), perform port scanning of internal networks, or use the server as a proxy for attacks against other systems.

🟠

Likely Case

Information disclosure from internal services, reconnaissance of internal network, or abuse of server resources for scanning external targets.

🟢

If Mitigated

Limited impact if network segmentation restricts server access to sensitive internal services and cloud metadata endpoints are protected.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities typically have low exploitation complexity, especially when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.6

Vendor Advisory: https://www.drupal.org/sa-contrib-2025-095

Restart Required: No

Instructions:

1. Update AI SEO Link Advisor module to version 1.0.6 via Drupal's update manager or Composer. 2. Clear Drupal caches. 3. Verify the module is functioning correctly after update.

🔧 Temporary Workarounds

Disable AI SEO Link Advisor Module

all

Temporarily disable the vulnerable module until patching is possible

drush pm:disable ai_seo_link_advisor

Network Segmentation

all

Restrict outbound HTTP/HTTPS connections from web servers to only necessary external services

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SSRF patterns in requests
  • Deploy network controls to restrict web server outbound connections to internal networks and cloud metadata endpoints

🔍 How to Verify

Check if Vulnerable:

Check Drupal's module list for AI SEO Link Advisor version. If version is between 0.0.0 and 1.0.5, the site is vulnerable.

Check Version:

drush pm:list | grep ai_seo_link_advisor

Verify Fix Applied:

Confirm AI SEO Link Advisor module version is 1.0.6 or higher in Drupal's module administration page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IP ranges, localhost, or cloud metadata endpoints
  • Multiple failed connection attempts to various ports from web server

Network Indicators:

  • HTTP requests from web server to internal services that shouldn't be accessed
  • Requests to 169.254.169.254 (AWS metadata), 169.254.169.253 (Azure), or similar cloud metadata endpoints

SIEM Query:

source="web_server_logs" AND (uri CONTAINS "http://" OR uri CONTAINS "https://") AND (dest_ip IN (RFC1918_RANGES) OR dest_ip="169.254.169.254" OR dest_ip="169.254.169.253")

🔗 References

📤 Share & Export