Miggo Logo

CVE-2025-28093:
ShopXO Vulnerable to Server-Side Request Forgery (SSRF) via Email Settings

6.3

CVSS Score

Basic Information

EPSS Score
-
Published
3/29/2025
Updated
4/1/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
shopxo/shopxocomposer<= 6.4.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The SSRF vulnerability in email settings suggests improper validation of user-supplied URLs/hosts in SMTP configuration. Based on typical PHP application patterns:

  1. EmailController::save would handle form submissions for email settings
  2. EmailService::testConnection would execute network operations to verify SMTP credentials Without proper input sanitization in these functions, user-controlled URLs could trigger internal network requests. Confidence is medium as these are common patterns despite lack of direct patch evidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

S*opXO v*.*.* is vuln*r**l* to S*rv*r-Si** R*qu*st *or**ry (SSR*) in *m*il S*ttin*s.

Reasoning

T** SSR* vuln*r**ility in *m*il s*ttin*s su***sts improp*r v*li**tion o* us*r-suppli** URLs/*osts in SMTP *on*i*ur*tion. **s** on typi**l P*P *ppli**tion p*tt*rns: *. *m*il*ontroll*r::s*v* woul* **n*l* *orm su*missions *or *m*il s*ttin*s *. *m*ilS*rv