{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14008","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-04T08:11:07.404Z","datePublished":"2025-12-04T15:02:06.355Z","dateUpdated":"2026-02-24T05:39:58.279Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T05:39:58.279Z"},"title":"dayrui XunRuiCMS Project Domain Change Test admin79f2ec220c7e.php server-side request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-918","lang":"en","description":"Server-Side Request Forgery"}]}],"affected":[{"vendor":"dayrui","product":"XunRuiCMS","versions":[{"version":"4.7.0","status":"affected"},{"version":"4.7.1","status":"affected"}],"cpes":["cpe:2.3:a:xunruicms:xunruicms:*:*:*:*:*:*:*:*"],"modules":["Project Domain Change Test"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in dayrui XunRuiCMS up to 4.7.1. This vulnerability affects unknown code of the file admin79f2ec220c7e.php?c=api&m=test_site_domain of the component Project Domain Change Test. This manipulation of the argument v causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-04T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-06T06:01:29.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"nobb (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.334250","name":"VDB-334250 | dayrui XunRuiCMS Project Domain Change Test admin79f2ec220c7e.php server-side request forgery","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.334250","name":"VDB-334250 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.692915","name":"Submit #692915 | Sichuan Xunrui Cloud Software Development Co., Ltd x <=4.7.1 Server-Side Request Forgery","tags":["third-party-advisory"]},{"url":"https://github.com/24-2021/vul/blob/main/xunruicms-test_site_domain-SSRF/xunruicms-test_site_domain-SSRF.md","tags":["broken-link","exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-05T19:14:49.242745Z","id":"CVE-2025-14008","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-05T19:15:03.484Z"}}]}}