Home

Description

A vulnerability was detected in xerrors Yuxi-Know up to 0.4.0. This vulnerability affects the function OtherEmbedding.aencode of the file /src/models/embed.py. Performing manipulation of the argument health_url results in server-side request forgery. The attack can be initiated remotely. The exploit is now public and may be used. The patch is named 0ff771dc1933d5a6b78f804115e78a7d8625c3f3. To fix this issue, it is recommended to deploy a patch. The vendor responded with a vulnerability confirmation and a list of security measures they have established already (e.g. disabled URL parsing, disabled URL upload mode, removed URL-to-markdown conversion).

PUBLISHED Reserved 2025-12-05 | Published 2025-12-05 | Updated 2025-12-05 | Assigner VulDB




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 4.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 4.7CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
5.8AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:OF/RC:C

Problem types

Server-Side Request Forgery

Product status

0.1
affected

0.2
affected

0.3
affected

0.4.0
affected

Timeline

2025-12-05:Advisory disclosed
2025-12-05:VulDB entry created
2025-12-05:VulDB entry last update

Credits

din4 (VulDB User) reporter

References

vuldb.com/?id.334492 (VDB-334492 | xerrors Yuxi-Know embed.py OtherEmbedding.aencode server-side request forgery) vdb-entry technical-description

vuldb.com/?ctiid.334492 (VDB-334492 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.697380 (Submit #697380 | xerrors Yuxi-Know Yuxi-Know ≤ 0.4.0 Server-Side Request Forgery) third-party-advisory

www.notion.so/...2a3c4180bea524f1a253f8d9a0?source=copy_link exploit

github.com/...ommit/0ff771dc1933d5a6b78f804115e78a7d8625c3f3 patch

cve.org (CVE-2025-14116)

nvd.nist.gov (CVE-2025-14116)