{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-30680","assignerOrgId":"7f7bd7df-cffe-4fdb-ab6d-859363b89272","state":"PUBLISHED","assignerShortName":"trendmicro","dateReserved":"2025-03-25T17:52:24.546Z","datePublished":"2025-06-17T19:56:23.405Z","dateUpdated":"2025-06-20T13:12:46.037Z"},"containers":{"cna":{"affected":[{"vendor":"Trend Micro, Inc.","product":"Trend Micro Apex Central","versions":[{"version":"SaaS","status":"affected","versionType":"semver","lessThan":"8.0.6955"}],"cpes":["cpe:2.3:a:trendmicro:apex_central:SaaS:*:*:en:*:windows_10:x86_64:1809"]}],"descriptions":[{"lang":"en","value":"A Server-side Request Forgery (SSRF) vulnerability in Trend Micro Apex Central (SaaS) could allow an attacker to manipulate certain parameters leading to information disclosure on affected installations.  \r\n\r\nPlease note: this vulnerability only affects the SaaS instance of Apex Central - customers that automatically apply Trend Micro's monthly maintenance releases to the SaaS instance do not have to take any further action."}],"providerMetadata":{"orgId":"7f7bd7df-cffe-4fdb-ab6d-859363b89272","shortName":"trendmicro","dateUpdated":"2025-06-17T19:56:23.405Z"},"references":[{"url":"https://success.trendmicro.com/en-US/solution/KA-0019355"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-25-238/"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE","baseSeverity":"HIGH","baseScore":7.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"}}],"problemTypes":[{"descriptions":[{"description":"CWE-918: SSRF","lang":"en-US","type":"CWE","cweId":"CWE-918"}]}],"tags":["exclusively-hosted-service"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-18T14:19:50.267446Z","id":"CVE-2025-30680","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-20T13:12:46.037Z"}}]}}