Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1844 | A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini. |
Github GHSA |
GHSA-wx24-vqrg-m6m5 | VuFind Server-Side Request Forgery (SSRF) vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://vufind.org/wiki/security:cve-2024-25738 |
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openlibraryfoundation
Openlibraryfoundation vufind |
|
| CPEs | cpe:2.3:a:openlibraryfoundation:vufind:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openlibraryfoundation
Openlibraryfoundation vufind |
|
| Metrics |
ssvc
|
Thu, 22 Aug 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-918 | |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:47:12.407Z
Reserved: 2024-02-11T00:00:00.000Z
Link: CVE-2024-25738
Updated: 2024-08-01T23:52:05.977Z
Status : Awaiting Analysis
Published: 2024-05-22T19:15:08.807
Modified: 2024-11-21T09:01:18.627
Link: CVE-2024-25738
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA