Home

Description

A vulnerability was found in ZenTao up to 21.7.6-8564. This affects the function makeRequest of the file module/ai/model.php. The manipulation of the argument Base results in server-side request forgery. The attack can be launched remotely. The exploit has been made public and could be used. Upgrading to version 21.7.6 mitigates this issue. It is suggested to upgrade the affected component.

PUBLISHED Reserved 2025-11-29 | Published 2025-11-30 | Updated 2025-12-01 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C

Problem types

Server-Side Request Forgery

Timeline

2025-11-29:Advisory disclosed
2025-11-29:VulDB entry created
2025-11-29:VulDB entry last update

Credits

ez-lbz (VulDB User) reporter

References

vuldb.com/?id.333793 (VDB-333793 | ZenTao model.php makeRequest server-side request forgery) vdb-entry technical-description

vuldb.com/?ctiid.333793 (VDB-333793 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.690728 (Submit #690728 | Zentao PMS <=21.7.6-85642 SSRF) third-party-advisory

github.com/ez-lbz/ez-lbz.github.io/issues/2 issue-tracking

github.com/ez-lbz/ez-lbz.github.io/issues/2 issue-tracking

github.com/ez-lbz/ez-lbz.github.io/issues/2 exploit issue-tracking

www.zentao.net/extension-viewext-6.html broken-link patch

cve.org (CVE-2025-13789)

nvd.nist.gov (CVE-2025-13789)

Download JSON