Impact
A weakness has been identified in the catchImage function of the Editor Endpoint in mingSoft MCMS 迄 5.5.0. The vulnerability is triggered by manipulating the catchimage argument, which allows a remote attacker to cause the server to send HTTP requests to arbitrary URLs. This manifests as a server‑side request forgery (SSRF) that can expose internal services or allow further exploitation. Publicly available exploit code demonstrates how the flaw can be abused remotely, potentially leading to unauthorized data access or privilege escalation on the host.
Affected Systems
The affected software is mingSoft MCMS version 5.5.0 and earlier. Any deployment of these versions of the Editor Endpoint is susceptible. The only vendor listed is mingSoft, and the product name is MCMS.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, and no EPSS data is available. The flaw is not listed in the CISA KEV catalog, but the presence of a public exploit and remote attack capability raise the practical risk. The attack does not require authentication and can be executed by sending a crafted request to the catchImage endpoint. Once exploited, an attacker could request internal resources or possibly execute arbitrary commands if the environment is vulnerable to further payloads.
OpenCVE Enrichment