Description
A vulnerability was found in ZenTao up to 21.7.6-8564. This affects the function makeRequest of the file module/ai/model.php. The manipulation of the argument Base results in server-side request forgery. The attack can be launched remotely. The exploit has been made public and could be used. Upgrading to version 21.7.6 mitigates this issue. It is suggested to upgrade the affected component.
Problem types
Timeline
| 2025-11-29: | Advisory disclosed |
| 2025-11-29: | VulDB entry created |
| 2025-11-29: | VulDB entry last update |
Credits
ez-lbz (VulDB User)
References
vuldb.com/?id.333793 (VDB-333793 | ZenTao model.php makeRequest server-side request forgery)
vuldb.com/?ctiid.333793 (VDB-333793 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.690728 (Submit #690728 | Zentao PMS <=21.7.6-85642 SSRF)
github.com/ez-lbz/ez-lbz.github.io/issues/2
github.com/ez-lbz/ez-lbz.github.io/issues/2
github.com/ez-lbz/ez-lbz.github.io/issues/2
www.zentao.net/extension-viewext-6.html