A vulnerability classified as critical has been found in diyhi bbs up to 6.8. This affects the function getUrl of the file /admin/login of the component HTTP Header Handler. The manipulation of the argument Host leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250618-02.md | Exploit |
| https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250618-02.md#steps-to-reproduce | Exploit |
| https://vuldb.com/?ctiid.314073 | Permissions Required VDB Entry |
| https://vuldb.com/?id.314073 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.598896 | Third Party Advisory VDB Entry |
| https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250618-02.md | Exploit |
Configurations
History
No history.
Information
Published : 2025-06-27 12:15
Updated : 2025-09-02 18:09
NVD link : CVE-2025-6762
Mitre link : CVE-2025-6762
CVE.ORG link : CVE-2025-6762
JSON object : View
Products Affected
diyhi
- bbs
CWE
CWE-918
Server-Side Request Forgery (SSRF)
