WonderCMS 3.5.0 is vulnerable to Server-Side Request Forgery (SSRF) in the custom module installation functionality. An authenticated administrator can supply a malicious URL via the pluginThemeUrl POST parameter. The server fetches the provided URL using curl_exec() without sufficient validation, allowing the attacker to force internal or external HTTP requests.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://github.com/thawphone/CVE-2025-57055 |
![]() ![]() ![]() |
History
Wed, 17 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-918 | |
Metrics |
cvssV3_1
|
Wed, 17 Sep 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | WonderCMS 3.5.0 is vulnerable to Server-Side Request Forgery (SSRF) in the custom module installation functionality. An authenticated administrator can supply a malicious URL via the pluginThemeUrl POST parameter. The server fetches the provided URL using curl_exec() without sufficient validation, allowing the attacker to force internal or external HTTP requests. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-17T17:23:49.120Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57055

Updated: 2025-09-17T17:21:08.934Z

Status : Received
Published: 2025-09-17T15:15:43.667
Modified: 2025-09-17T18:15:52.183
Link: CVE-2025-57055

No data.

No data.