{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-13872","assignerOrgId":"64c5ae8f-7972-4697-86a0-7ada793ac795","state":"PUBLISHED","assignerShortName":"TCS-CERT","dateReserved":"2025-12-02T09:17:04.605Z","datePublished":"2025-12-02T09:51:59.865Z","dateUpdated":"2025-12-02T16:55:02.348Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","modules":["The feature to import a survey"],"product":"Opinio","vendor":"ObjectPlanet","versions":[{"status":"affected","version":"7.26 rev12562"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:objectplanet:opinio:7.26_rev12562:*:*:*:*:*:*:*","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"OR"}],"credits":[{"lang":"en","type":"finder","value":"Dominique Righetto"}],"datePublic":"2025-07-31T08:54:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<br>\n\n\n\nBlind Server-Side Request Forgery (SSRF) in the survey-import feature of \n\n <span style=\"background-color: rgb(255, 255, 255);\">ObjectPlanet</span><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;</span><span style=\"background-color: rgb(255, 255, 255);\">Opinio</span><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;7.26 rev12562</span>&nbsp;on <em></em>\n\nWeb-based platforms allows an attacker to force the server to perform HTTP GET requests via crafted import requests \n\n to an arbitrary destination.\n\n\n\n<br>"}],"value":"Blind Server-Side Request Forgery (SSRF) in the survey-import feature of \n\n ObjectPlanet Opinio 7.26 rev12562 on \n\nWeb-based platforms allows an attacker to force the server to perform HTTP GET requests via crafted import requests \n\n to an arbitrary destination."}],"impacts":[{"capecId":"CAPEC-664","descriptions":[{"lang":"en","value":"CAPEC-664 Server Side Request Forgery"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":2.1,"baseSeverity":"LOW","exploitMaturity":"NOT_DEFINED","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-918","description":"CWE-918 Server-Side Request Forgery (SSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"64c5ae8f-7972-4697-86a0-7ada793ac795","shortName":"TCS-CERT","dateUpdated":"2025-12-02T09:51:59.865Z"},"references":[{"tags":["release-notes"],"url":"https://www.objectplanet.com/opinio/changelog.html"}],"source":{"discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2024-12-01T09:10:00.000Z","value":"Vulnerability discovery"},{"lang":"en","time":"2024-12-10T14:22:00.000Z","value":"Vulnerability Report to TCS-CERT"},{"lang":"en","time":"2024-12-19T15:33:00.000Z","value":"Vulnerability Report to Vendor through email : opinio@support.objectplanet.com"},{"lang":"en","time":"2024-12-24T15:34:00.000Z","value":"Feedback asked to vendor, check if the vendor received the PoC in an encrypted archive"},{"lang":"en","time":"2025-01-10T15:32:00.000Z","value":"New follow-up email was send to the vendor"},{"lang":"en","time":"2025-01-13T15:37:00.000Z","value":"Vendor confirmed the reception of the PoC, vendor asked to wait 90-day period before publishing (responsible disclosure), and will try to fix the vulnerability"},{"lang":"en","time":"2025-01-14T15:37:00.000Z","value":"Answer to vendor to acknowledge 90 days period"},{"lang":"en","time":"2025-03-10T15:38:00.000Z","value":"Vendor informed us that they will realse the fix by the end of this month"},{"lang":"en","time":"2025-04-23T14:39:00.000Z","value":"An email was sent to check where they stand on the release and fixes for the reported issues"},{"lang":"en","time":"2025-06-21T14:39:00.000Z","value":"A feedback was requested from vendor regarding their progreess"},{"lang":"en","time":"2025-06-30T14:39:00.000Z","value":"A feedback was requested from vendor regarding their progreess"},{"lang":"en","time":"2025-07-31T14:39:00.000Z","value":"The vendor released the newer fixed version which is the Opinio Version 7.27"}],"title":"Blind Server-Side Request Forgery (SSRF) in the survey-import feature of ObjectPlanet Opinio","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-02T16:50:34.265761Z","id":"CVE-2025-13872","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-02T16:55:02.348Z"}}]}}