CVE-2024-48907

Sematell ReplyOne 7.4.3.0 allows SSRF via the application server API.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:sematell:replyone:7.4.3.0:*:*:*:*:*:*:*

History

04 Jun 2025, 17:26

Type Values Removed Values Added
First Time Sematell
Sematell replyone
CPE cpe:2.3:a:sematell:replyone:7.4.3.0:*:*:*:*:*:*:*
References () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-083.txt - () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-083.txt - Exploit, Third Party Advisory

02 May 2025, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-918

02 May 2025, 13:52

Type Values Removed Values Added
Summary
  • (es) Sematell ReplyOne 7.4.3.0 permite SSRF a través de la API del servidor de aplicaciones.

01 May 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 21:15

Updated : 2025-06-04 17:26


NVD link : CVE-2024-48907

Mitre link : CVE-2024-48907

CVE.ORG link : CVE-2024-48907


JSON object : View

Products Affected

sematell

  • replyone
CWE
CWE-918

Server-Side Request Forgery (SSRF)