CVE-2024-25737: VuFind Server-Side Request Forgery (SSRF) vulnerability
9.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.43089%
CWE
Published
5/22/2024
Updated
11/12/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| vufind/vufind | composer | >= 2.4, < 9.1.1 | 9.1.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues in showAction: 1) It accepted arbitrary URLs via the 'proxy' parameter without proper host validation (SSRF), and 2) It allowed dangerous content types like SVG through a simple 'image/' prefix check (XSS). The patches added host validation (proxyAllowedForUrl) and strict content-type checking (isValidProxyImageContentType), confirming these were missing in vulnerable versions. The showAction is the entry point for these flawed proxy operations.