Description
A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini.
Published: 2024-05-22
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-1844 A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini.
Github GHSA Github GHSA GHSA-wx24-vqrg-m6m5 VuFind Server-Side Request Forgery (SSRF) vulnerability
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0127}

epss

{'score': 0.01159}


Thu, 13 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Openlibraryfoundation
Openlibraryfoundation vufind
CPEs cpe:2.3:a:openlibraryfoundation:vufind:*:*:*:*:*:*:*:*
Vendors & Products Openlibraryfoundation
Openlibraryfoundation vufind
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 22 Aug 2024 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Openlibraryfoundation Vufind
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-13T15:47:12.407Z

Reserved: 2024-02-11T00:00:00.000Z

Link: CVE-2024-25738

cve-icon Vulnrichment

Updated: 2024-08-01T23:52:05.977Z

cve-icon NVD

Status : Deferred

Published: 2024-05-22T19:15:08.807

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-25738

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses