{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-13789","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-11-29T20:28:34.209Z","datePublished":"2025-11-30T13:32:16.964Z","dateUpdated":"2025-12-01T15:48:42.607Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-11-30T13:32:16.964Z"},"title":"ZenTao model.php makeRequest server-side request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-918","lang":"en","description":"Server-Side Request Forgery"}]}],"affected":[{"vendor":"n/a","product":"ZenTao","versions":[{"version":"21.7.6-8564","status":"affected"},{"version":"21.7.6","status":"unaffected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in ZenTao up to 21.7.6-8564. This affects the function makeRequest of the file module/ai/model.php. The manipulation of the argument Base results in server-side request forgery. The attack can be launched remotely. The exploit has been made public and could be used. Upgrading to version 21.7.6 mitigates this issue. It is suggested to upgrade the affected component."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-11-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-11-29T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-11-29T21:34:00.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ez-lbz (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.333793","name":"VDB-333793 | ZenTao model.php makeRequest server-side request forgery","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.333793","name":"VDB-333793 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.690728","name":"Submit #690728 | Zentao PMS <=21.7.6-85642 SSRF","tags":["third-party-advisory"]},{"url":"https://github.com/ez-lbz/ez-lbz.github.io/issues/2","tags":["issue-tracking"]},{"url":"https://github.com/ez-lbz/ez-lbz.github.io/issues/2#issuecomment-3540247346","tags":["issue-tracking"]},{"url":"https://github.com/ez-lbz/ez-lbz.github.io/issues/2#issue-3598317459","tags":["exploit","issue-tracking"]},{"url":"https://www.zentao.net/extension-viewext-6.html","tags":["broken-link","patch"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-01T15:48:02.464124Z","id":"CVE-2025-13789","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-01T15:48:42.607Z"}}]}}