A vulnerability has been found in orionsec orion-ops up to 5925824997a3109651bbde07460958a7be249ed1. Affected by this issue is some unknown functionality of the file orion-ops-api/orion-ops-web/src/main/java/cn/orionsec/ops/controller/MachineInfoController.java of the component SSH Connection Handler. Such manipulation of the argument host/sshPort/username/password/authType leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. A patch should be applied to remediate this issue. The vendor was contacted early about this disclosure but did not respond in any way.
References
Configurations
No configuration.
History
01 Dec 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Xzzz111/exps/blob/main/archives/orion-ops-ssrf-1/report.md - | |
| References | () https://github.com/Xzzz111/exps/blob/main/archives/orion-ops-ssrf-1/report.md#proof-of-concept - |
01 Dec 2025, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-01 06:15
Updated : 2025-12-01 15:39
NVD link : CVE-2025-13809
Mitre link : CVE-2025-13809
CVE.ORG link : CVE-2025-13809
JSON object : View
Products Affected
No product.
CWE
CWE-918
Server-Side Request Forgery (SSRF)
