{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9402","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-24T14:52:36.289Z","datePublished":"2025-08-25T01:32:07.248Z","dateUpdated":"2025-08-25T20:30:20.427Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-25T01:32:07.248Z"},"title":"HuangDou UTCMS Config update.php server-side request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-918","lang":"en","description":"Server-Side Request Forgery"}]}],"affected":[{"vendor":"HuangDou","product":"UTCMS","versions":[{"version":"9","status":"affected"}],"modules":["Config Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in HuangDou UTCMS 9. This issue affects some unknown processing of the file app/modules/ut-frame/admin/update.php of the component Config Handler. Performing manipulation of the argument UPDATEURL results in server-side request forgery. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In HuangDou UTCMS 9 wurde eine Schwachstelle gefunden. Es geht um eine nicht näher bekannte Funktion der Datei app/modules/ut-frame/admin/update.php der Komponente Config Handler. Durch Manipulieren des Arguments UPDATEURL mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit ist öffentlich verfügbar und könnte genutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-24T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-24T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-24T16:57:42.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Yu Bao (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.321238","name":"VDB-321238 | HuangDou UTCMS Config update.php server-side request forgery","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.321238","name":"VDB-321238 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.632537","name":"Submit #632537 | HuangDou UTCMS V9 RCE vulnerability for remote file download in the background","tags":["third-party-advisory"]},{"url":"https://github.com/August829/Yu/blob/main/20250811_1.md","tags":["related"]},{"url":"https://github.com/August829/Yu/blob/main/20250811_1.md#poc","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-25T20:30:11.556232Z","id":"CVE-2025-9402","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-25T20:30:20.427Z"}}]}}