Sematell ReplyOne 7.4.3.0 allows SSRF via the application server API.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-083.txt | Exploit Third Party Advisory | 
Configurations
                    History
                    04 Jun 2025, 17:26
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Sematell Sematell replyone | |
| CPE | cpe:2.3:a:sematell:replyone:7.4.3.0:*:*:*:*:*:*:* | |
| References | () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-083.txt - Exploit, Third Party Advisory | 
02 May 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.5 | 
| CWE | CWE-918 | 
02 May 2025, 13:52
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
01 May 2025, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-05-01 21:15
Updated : 2025-06-04 17:26
NVD link : CVE-2024-48907
Mitre link : CVE-2024-48907
CVE.ORG link : CVE-2024-48907
JSON object : View
Products Affected
                sematell
- replyone
CWE
                
                    
                        
                        CWE-918
                        
            Server-Side Request Forgery (SSRF)
