CVE-2025-13809

A vulnerability has been found in orionsec orion-ops up to 5925824997a3109651bbde07460958a7be249ed1. Affected by this issue is some unknown functionality of the file orion-ops-api/orion-ops-web/src/main/java/cn/orionsec/ops/controller/MachineInfoController.java of the component SSH Connection Handler. Such manipulation of the argument host/sshPort/username/password/authType leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. A patch should be applied to remediate this issue. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

No configuration.

History

01 Dec 2025, 15:15

Type Values Removed Values Added
References () https://github.com/Xzzz111/exps/blob/main/archives/orion-ops-ssrf-1/report.md - () https://github.com/Xzzz111/exps/blob/main/archives/orion-ops-ssrf-1/report.md -
References () https://github.com/Xzzz111/exps/blob/main/archives/orion-ops-ssrf-1/report.md#proof-of-concept - () https://github.com/Xzzz111/exps/blob/main/archives/orion-ops-ssrf-1/report.md#proof-of-concept -

01 Dec 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-01 06:15

Updated : 2025-12-01 15:39


NVD link : CVE-2025-13809

Mitre link : CVE-2025-13809

CVE.ORG link : CVE-2025-13809


JSON object : View

Products Affected

No product.

CWE
CWE-918

Server-Side Request Forgery (SSRF)