CVE-2025-8772

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to perform server-side request forgery (SSRF) attacks against NukeViet CMS installations. Attackers can manipulate the module handler's upload functionality to make the server send requests to internal or external systems. All NukeViet installations up to version 4.5.06 are affected.

💻 Affected Systems

Products:
  • Vinades NukeViet
Versions: up to 4.5.06
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin access to the vulnerable endpoint, but the vulnerability exists in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or use the vulnerable server as a proxy for attacks against other systems.

🟠

Likely Case

Information disclosure from internal services, port scanning of internal networks, or limited data exfiltration.

🟢

If Mitigated

Limited impact if network segmentation restricts internal service access and egress filtering blocks external requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available, and the vulnerability requires admin access to the /admin/index.php endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to the latest version if it addresses this vulnerability, or implement workarounds.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit access to the /admin/ directory to trusted IP addresses only

# Apache: <Location /admin/>
#   Require ip 192.168.1.0/24
# </Location>
# Nginx: location /admin/ {
#   allow 192.168.1.0/24;
#   deny all;
# }

Input Validation

all

Add validation to reject URLs in the vulnerable parameter

# In /admin/index.php, add validation for the 'nv' parameter
# Example: if (isset($_GET['nv']) && strpos($_GET['nv'], 'upload') !== false) {
#   // Validate and sanitize input
# }

🧯 If You Can't Patch

  • Implement network segmentation to isolate the NukeViet server from sensitive internal services
  • Deploy a web application firewall (WAF) with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check if your NukeViet version is 4.5.06 or earlier and if the /admin/index.php?language=en&nv=upload endpoint is accessible

Check Version:

Check the NukeViet version in the admin panel or look for version information in the source code

Verify Fix Applied:

Test if SSRF attempts through the vulnerable endpoint are blocked or properly validated

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /admin/index.php with 'nv=upload' parameter containing URLs
  • Outbound requests from the server to unusual internal or external IPs

Network Indicators:

  • Unexpected outbound connections from the web server to internal services

SIEM Query:

web.url:"/admin/index.php" AND web.param:"nv=upload" AND (web.param:"http://" OR web.param:"https://")

🔗 References

📤 Share & Export