Impact
A flaw in the Summary method of the HtmlUtil class permits manipulation of the URL argument, enabling a server‑side request forgery vulnerability. By supplying a crafted URL, an attacker can cause the application to send arbitrary requests from the server, potentially accessing internal resources or facilitating further compromise. The weakness is identified as CWE‑918, and the vendor has documented the issue for all releases up to version 2.28.0.
Affected Systems
xiweicheng Teamwork Management System (TMS) versions up to 2.28.0 are affected. The vulnerability originates in the src/main/java/com/lhjz/portal/util/HtmlUtil.java file. No specific sub‑components beyond the TMS platform are mentioned, and the impact applies to any deployment of the mentioned versions.
Risk and Exploitability
CVSS score 5.3 indicates a moderate severity. The EPSS score is below 1%, suggesting low current exploitation probability, but the exploit has been published and can be triggered remotely. The vulnerability is not listed in CISA’s KEV catalog. Attackers could leverage SSRF to reach internal services, exfiltrate data, or pivot to further attacks, especially if the application’s network is not adequately segmented.
OpenCVE Enrichment