Description
Jizhicms v2.5.4 is vulnerable to Server-Side Request Forgery (SSRF) in User Evaluation, Message, and Comment modules.
Published: 2026-04-09
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote server-side request forgery (SSRF) allowing an attacker to manipulate outbound requests initiated by the application
Action: Immediate Patch
AI Analysis

Impact

Application logic in Jizhicms 2.5.4 processes URLs supplied by users in the User Evaluation, Message, and Comment modules without validating the destination. An attacker can thus cause the server to send requests to arbitrary internal or external endpoints, potentially exposing sensitive data, facilitating lateral movement, or enabling fetching of resources hidden from the public network. The weakness is classified as CWE‑918, which indicates unchecked server-side request handling. The impact encompasses confidentiality and integrity of internal services, potential data exfiltration, and the compromise of the affected server’s trust boundary.

Affected Systems

Jizhicms Community Edition version 2.5.4 on any web server configuration. No other versions or variants were identified in the provided data. The product is known under the namespace jizhicms:jizhicms, and the vulnerability is tied to its web modules handling user-generated content.

Risk and Exploitability

The CVSS score of 9.1 denotes a high severity attack with remote hijacking potential. EPSS indicates the likelihood of exploitation is low (<1%), and the vulnerability is not currently listed in CISA's KEV catalog. Nevertheless, SSRF flaws are routinely exploited in the wild, especially when the application allows arbitrary URLs. An attacker would send a crafted request through the vulnerable module to the target, triggering the server to act as a proxy. No special authentication or privileged access is described in the input, suggesting that the attack could be performed by any external user submitting content to the affected modules.

Generated by OpenCVE AI on April 14, 2026 at 21:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Jizhicms to the latest available version that addresses SSRF in user modules
  • If an upgrade is unavailable, restrict outbound traffic from the web server using firewall rules or proxy settings to prevent access to sensitive internal networks
  • Validate and whitelist acceptable URL schemes and domains within the application's code to eliminate untrusted requests
  • Patch or disable the vulnerable modules’ URL processing if an immediate update is possible
  • Monitor incoming user content for suspicious URLs and audit outbound requests for anomalous destinations

Generated by OpenCVE AI on April 14, 2026 at 21:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Title Server‑Side Request Forgery in User Evaluation, Message, and Comment Modules of Jizhicms v2.5.4

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Jizhicms
Jizhicms jizhicms
CPEs cpe:2.3:a:jizhicms:jizhicms:2.5.4:*:*:*:*:*:*:*
Vendors & Products Jizhicms
Jizhicms jizhicms

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title Server‑Side Request Forgery in User Evaluation, Message, and Comment Modules of Jizhicms v2.5.4
Weaknesses CWE-918

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Cherry-toto
Cherry-toto jizhicms
Vendors & Products Cherry-toto
Cherry-toto jizhicms

Thu, 09 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Jizhicms v2.5.4 is vulnerable to Server-Side Request Forgery (SSRF) in User Evaluation, Message, and Comment modules.
References

Subscriptions

Cherry-toto Jizhicms
Jizhicms Jizhicms
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-14T16:35:45.324Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50228

cve-icon Vulnrichment

Updated: 2026-04-14T14:40:28.942Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T15:16:07.433

Modified: 2026-04-14T20:11:40.267

Link: CVE-2025-50228

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:00:07Z

Weaknesses