Impact
A flaw in the apiServerUrl1 function within DbGate's REST/GraphQL module exposes a server‑side request forgery vulnerability. This issue allows an attacker to craft requests that the server will forward to arbitrary internal or external URLs, potentially accessing restricted resources or probing the network. The vulnerability admits remote exploitation, and a public exploit is available, indicating that attackers can initiate the attack from any network that can reach the DBGate instance.
Affected Systems
All installations of DbGate up to and including version 7.1.4 are affected. The flaw resides in the packages/rest/src/openApiDriver.ts component of the REST/GraphQL interface. No other specific sub‑products or configuration details were provided, but any instance of DbGate exposing the REST/GraphQL API is at risk.
Risk and Exploitability
The CVSS score is 5.3, reflecting a moderate level of severity. The EPSS value is not available, and the vulnerability is not listed in the CISA KEV catalog. Because the exploit code is publicly available and the attack can be initiated remotely, the likelihood of exploitation is appreciable, especially in environments where the REST/GraphQL API is exposed without additional controls.
OpenCVE Enrichment