Impact
Connect‑CMS includes a server‑side request forgery vulnerability in the External Page Migration feature of the Page Management Plugin. The likely attack vector is that an attacker supplies a crafted migration URL, causing the CMS server to initiate HTTP requests to arbitrary internal or external addresses. Based on the description, it is inferred that such requests could expose confidential resources, bypass network segmentation, or serve as a foothold for further attacks against the host system or underlying network. The weakness is classified as CWE‑918.
Affected Systems
Versions of Connect‑CMS from the 1.x series up to 1.41.0 and the 2.x series up to 2.41.0 are affected. Versions 1.41.1 and 2.41.1 contain a patch that eliminates the SSRF condition. The affected product is identified as opensource‑workshop Connect‑CMS.
Risk and Exploitability
The CVSS score of 6.8 indicates a medium severity impact, while the EPSS score of less than 1% suggests a low likelihood of active exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the ability to invoke the external page migration function—which may be reachable by authenticated users with plugin access or potentially by unauthenticated users if the feature is exposed. This inference comes directly from the described symptom that the flaw exists in the page migration feature. Although the statistical likelihood is currently low, the potential to reach internal services or sensitive data makes prompt remediation advisable.
OpenCVE Enrichment
Github GHSA