Description
Server-Side Request Forgery (SSRF) vulnerability exists in the AnnounContent of the /admin/read.php in OTCMS V7.66 and before. The vulnerability allows remote attackers to craft HTTP requests, without authentication, containing a URL pointing to internal services or any remote server
Published: 2026-03-27
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote internal network access via SSRF
Action: Patch Now
AI Analysis

Impact

A Server‑Side Request Forgery flaw in the OTCMS content management system’s /admin/read.php endpoint lets an attacker, without authentication, send arbitrary URLs in the AnnounContent parameter. The server then performs an HTTP request to the specified address, exposing internal services or any remote target to the attacker. This could lead to the leakage of sensitive information, probing of internal network services, or use of the server as a proxy for subsequent attacks.

Affected Systems

The vulnerability affects all versions of OTCMS up to and including 7.66. Any installation that allows users to modify the AnnounContent field in the /admin/read.php script is at risk.

Risk and Exploitability

With a CVSS score of 7.5 the flaw carries high severity, yet the EPSS score of less than 1% suggests low likelihood of exploitation in the wild. The defect is not listed in the CISA KEV catalog. Because it does not require authentication, an external attacker can exploit the SSRF directly; if the attacker already has network access, the risk is amplified, making it a serious threat to confidentiality.

Generated by OpenCVE AI on April 1, 2026 at 07:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OTCMS to a version that removes the SSRF issue.
  • If upgrading is not possible, restrict /admin/read.php access to trusted IP ranges only.
  • Implement strict validation on the AnnounContent parameter to allow only whitelisted URLs and reject internal or privileged addresses.
  • Monitor outbound HTTP traffic from the OTCMS server for unusual destinations.
  • Review the referenced audit documentation for any additional vendor guidance.

Generated by OpenCVE AI on April 1, 2026 at 07:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title Server‑Side Request Forgery in OTCMS Admin Read Endpoint

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Otcms
Otcms otcms
CPEs cpe:2.3:a:otcms:otcms:*:*:*:*:*:*:*:*
Vendors & Products Otcms
Otcms otcms

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Idccms
Idccms otcms
Vendors & Products Idccms
Idccms otcms

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Title Server‑Side Request Forgery in OTCMS /admin/read.php Exposes Internal Services

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title Server‑Side Request Forgery in OTCMS /admin/read.php Exposes Internal Services
Weaknesses CWE-918

Fri, 27 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability exists in the AnnounContent of the /admin/read.php in OTCMS V7.66 and before. The vulnerability allows remote attackers to craft HTTP requests, without authentication, containing a URL pointing to internal services or any remote server
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-27T20:29:17.851Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30637

cve-icon Vulnrichment

Updated: 2026-03-27T20:28:53.052Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T15:16:53.490

Modified: 2026-03-31T21:07:36.150

Link: CVE-2026-30637

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:55:58Z

Weaknesses