Home

Description

A security vulnerability has been detected in deco-cx apps up to 0.120.1. Affected by this vulnerability is the function AnalyticsScript of the file website/loaders/analyticsScript.ts of the component Parameter Handler. Such manipulation of the argument url leads to server-side request forgery. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 0.120.2 addresses this issue. It is suggested to upgrade the affected component.

PUBLISHED Reserved 2025-11-30 | Published 2025-11-30 | Updated 2025-12-01 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C

Problem types

Server-Side Request Forgery

Product status

0.120.0
affected

0.120.1
affected

0.120.2
unaffected

Timeline

2025-11-30:Advisory disclosed
2025-11-30:VulDB entry created
2025-11-30:VulDB entry last update

Credits

cucumbersalad (VulDB User) reporter

cucumbersalad (VulDB User) analyst

References

vuldb.com/?id.333807 (VDB-333807 | deco-cx apps Parameter analyticsScript.ts AnalyticsScript server-side request forgery) vdb-entry technical-description

vuldb.com/?ctiid.333807 (VDB-333807 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.691837 (Submit #691837 | Deco deco-apps 0.114.12 - 0.120.1 Server-Side Request Forgery) third-party-advisory

github.com/deco-cx/apps/pull/1360 issue-tracking

github.com/deco-cx/apps/releases/tag/0.120.2 patch

cve.org (CVE-2025-13796)

nvd.nist.gov (CVE-2025-13796)

Download JSON