Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 31 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anheng Information
Anheng Information mingyu Operations And Maintenance Audit And Risk Control System |
|
| Vendors & Products |
Anheng Information
Anheng Information mingyu Operations And Maintenance Audit And Risk Control System |
Thu, 30 Oct 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Anheng Mingyu Operation and Maintenance Audit and Risk Control System up to 2023-08-10 contains a server-side request forgery (SSRF) vulnerability in the xmlrpc.sock handler. The product accepts specially crafted XML-RPC requests that can be used to instruct the server to connect to internal unix socket RPC endpoints and perform privileged XML-RPC methods. An attacker able to send such requests can invoke administrative RPC methods via the unix socket interface to create arbitrary user accounts on the system, resulting in account creation and potential takeover of the bastion host. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-30 at 00:30:17.837319 UTC. | |
| Title | Mingyu Operations and Maintenance Audit and Risk Control System xmlrpc.sock SSRF | |
| Weaknesses | CWE-306 CWE-918 |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-31T17:18:04.911Z
Reserved: 2025-10-30T18:47:16.870Z
Link: CVE-2023-7325
Updated: 2025-10-31T17:17:58.840Z
Status : Awaiting Analysis
Published: 2025-10-30T22:15:44.473
Modified: 2025-11-04T15:41:56.843
Link: CVE-2023-7325
No data.
OpenCVE Enrichment
Updated: 2025-10-31T10:13:58Z