Impact
A flaw in the catchImage method of MingSoft MCMS allows an attacker to supply a manipulated parameter that causes the application to perform arbitrary outbound HTTP requests. This can lead the vulnerable server to reach internal or external resources, potentially exfiltrating data or interacting with other services without authorization. The weakness falls under CWE‑918 and is rated as a Medium severity issue with a base score of 6.9.
Affected Systems
The vulnerability exists in all MingSoft MCMS installations running version 5.5.0 or earlier, specifically within the Editor Endpoint component implemented in BaseAction.java. Any deployment that has not upgraded beyond this version remains susceptible unless the catchImage endpoint has been disabled or otherwise restricted.
Risk and Exploitability
The moderate score indicates a non‑zero risk, while the lack of an EPSS value means current exploit probability data is unavailable. The attack can be executed remotely by sending crafted input to the catchImage parameter, and the vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog. Without remediation, an attacker can trigger the server to contact arbitrary URLs, potentially exposing internal services or leaking sensitive data.
OpenCVE Enrichment