InstantCMS is a free and open source content management system. A blind Server-Side Request Forgery (SSRF) vulnerability in InstantCMS up to and including 2.17.3 allows authenticated remote attackers to make nay HTTP/HTTPS request via the package parameter. It is possible to make any HTTP/HTTPS request to any website in installer functionality. Due to such vulnerability it is possible to for example scan local network, call local services and its functions, conduct a DoS attack, and/or disclose a server's real IP if it's behind a reverse proxy. It is also possible to exhaust server resources by sending plethora of such requests. As of time of publication, no patched releases are available.
References
| Link | Resource |
|---|---|
| https://github.com/instantsoft/icms2/commit/fa997bdab3429fad0c850966bfacbcb96d5ab041 | Patch |
| https://github.com/instantsoft/icms2/security/advisories/GHSA-79hh-mhvg-whrw | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-09-11 19:15
Updated : 2025-09-24 13:30
NVD link : CVE-2025-59055
Mitre link : CVE-2025-59055
CVE.ORG link : CVE-2025-59055
JSON object : View
Products Affected
instantcms
- instantcms
CWE
CWE-918
Server-Side Request Forgery (SSRF)
