CVE-2025-14004

A security flaw has been discovered in dayrui XunRuiCMS up to 4.7.1. Affected is an unknown function of the file /admind45f74adbd95.php?c=email&m=add of the component Email Setting Handler. Performing a manipulation results in server-side request forgery. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/24-2021/vul/blob/main/xunruicms-email_test-SSRF/xunruicms-email_test-SSRF.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.334246 Permissions Required VDB Entry
https://vuldb.com/?id.334246 Third Party Advisory VDB Entry
https://vuldb.com/?submit.692907 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:xunruicms:xunruicms:*:*:*:*:*:*:*:*

History

24 Feb 2026, 06:16

Type Values Removed Values Added
Summary
  • (es) Se ha descubierto una vulnerabilidad de seguridad en dayrui XunRuiCMS hasta la versión 4.7.1. Afecta a una función desconocida del archivo /admind45f74adbd95.php?c=email&m=add del componente Email Setting Handler. Realizar una manipulación resulta en falsificación de petición del lado del servidor. La explotación remota del ataque es posible. El exploit ha sido publicado y puede ser explotado. Se contactó con el proveedor con antelación sobre esta divulgación, pero no respondió de ninguna manera.
Summary (en) A security flaw has been discovered in dayrui XunRuiCMS up to 4.7.1. Affected is an unknown function of the file /admind45f74adbd95.php?c=email&m=add of the component Email Setting Handler. Performing manipulation results in server-side request forgery. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way. (en) A security flaw has been discovered in dayrui XunRuiCMS up to 4.7.1. Affected is an unknown function of the file /admind45f74adbd95.php?c=email&m=add of the component Email Setting Handler. Performing a manipulation results in server-side request forgery. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

08 Dec 2025, 13:39

Type Values Removed Values Added
First Time Xunruicms
Xunruicms xunruicms
CPE cpe:2.3:a:xunruicms:xunruicms:*:*:*:*:*:*:*:*
References () https://github.com/24-2021/vul/blob/main/xunruicms-email_test-SSRF/xunruicms-email_test-SSRF.md - () https://github.com/24-2021/vul/blob/main/xunruicms-email_test-SSRF/xunruicms-email_test-SSRF.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.334246 - () https://vuldb.com/?ctiid.334246 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.334246 - () https://vuldb.com/?id.334246 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.692907 - () https://vuldb.com/?submit.692907 - Third Party Advisory, VDB Entry

04 Dec 2025, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-04 14:16

Updated : 2026-02-24 06:16


NVD link : CVE-2025-14004

Mitre link : CVE-2025-14004

CVE.ORG link : CVE-2025-14004


JSON object : View

Products Affected

xunruicms

  • xunruicms
CWE
CWE-918

Server-Side Request Forgery (SSRF)