{"api_version":"1","generated_at":"2026-04-18T04:17:10+00:00","cve":"CVE-2021-25972","urls":{"html":"https://cve.report/CVE-2021-25972","api":"https://cve.report/api/cve/CVE-2021-25972.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-25972","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-25972"},"summary":{"title":"CVE-2021-25972","description":"In Camaleon CMS, versions 2.1.2.0 to 2.6.0, are vulnerable to Server-Side Request Forgery (SSRF) in the media upload feature, which allows admin users to fetch media files from external URLs but fails to validate URLs referencing to localhost or other internal servers. This allows attackers to read files stored in the internal server.","state":"PUBLIC","assigner":"vulnerabilitylab@whitesourcesoftware.com","published_at":"2021-10-20 12:15:00","updated_at":"2021-10-25 19:20:00"},"problem_types":["CWE-918"],"metrics":[],"references":[{"url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25972","name":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25972","refsource":"MISC","tags":[],"title":"CVE-2021-25972 | WhiteSource Vulnerability Database","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/owen2345/camaleon-cms/commit/5a252d537411fdd0127714d66c1d76069dc7e190","name":"https://github.com/owen2345/camaleon-cms/commit/5a252d537411fdd0127714d66c1d76069dc7e190","refsource":"MISC","tags":[],"title":"Disallow uploads from localhost · owen2345/camaleon-cms@5a252d5 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-25972","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25972","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"25972","vulnerable":"1","versionEndIncluding":"2.6.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tuzitio","cpe5":"camaleon_cms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"vulnerabilitylab@whitesourcesoftware.com","ID":"CVE-2021-25972","STATE":"PUBLIC","TITLE":"Camaleon CMS - Server-Side Request Forgery (SSRF) in Media Upload Feature"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"camaleon_cms","version":{"version_data":[{"version_affected":">=","version_value":"2.1.2.0"},{"version_affected":"<=","version_value":"2.6.0"}]}}]},"vendor_name":"camaleon_cms"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Camaleon CMS, versions 2.1.2.0 to 2.6.0, are vulnerable to Server-Side Request Forgery (SSRF) in the media upload feature, which allows admin users to fetch media files from external URLs but fails to validate URLs referencing to localhost or other internal servers. This allows attackers to read files stored in the internal server."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-918 Server-Side Request Forgery (SSRF)"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://github.com/owen2345/camaleon-cms/commit/5a252d537411fdd0127714d66c1d76069dc7e190","name":"https://github.com/owen2345/camaleon-cms/commit/5a252d537411fdd0127714d66c1d76069dc7e190"},{"refsource":"MISC","url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25972","name":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25972"}]},"solution":[{"lang":"eng","value":"Update to 2.6.0.1"}],"source":{"advisory":"https://www.whitesourcesoftware.com/vulnerability-database/","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-10-20 12:15:00","lastModifiedDate":"2021-10-25 19:20:00","problem_types":["CWE-918"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tuzitio:camaleon_cms:*:*:*:*:*:*:*:*","versionStartIncluding":"2.1.2.0","versionEndIncluding":"2.6.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"25972","Ordinal":"200899","Title":"CVE-2021-25972","CVE":"CVE-2021-25972","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"25972","Ordinal":"1","NoteData":"In Camaleon CMS, versions 2.1.2.0 to 2.6.0, are vulnerable to Server-Side Request Forgery (SSRF) in the media upload feature, which allows admin users to fetch media files from external URLs but fails to validate URLs referencing to localhost or other internal servers. This allows attackers to read files stored in the internal server.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"25972","Ordinal":"2","NoteData":"2021-10-20","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"25972","Ordinal":"3","NoteData":"2021-10-20","Type":"Other","Title":"Modified"}]}}}