Home

Description

DoraCMS version 3.1 and prior contains a server-side request forgery (SSRF) vulnerability in its UEditor remote image fetch functionality. The application accepts user-supplied URLs and performs server-side HTTP or HTTPS requests without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal or private IP address ranges, or apply request timeouts or response size limits. An attacker can abuse this behavior to induce the server to issue outbound requests to arbitrary hosts, including internal network resources, potentially enabling internal network scanning and denial of service through resource exhaustion.

PUBLISHED Reserved 2026-02-06 | Published 2026-02-10 | Updated 2026-02-11 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L

MEDIUM: 5.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Default status
unknown

Any version
affected

Credits

Lennon Chia finder

References

github.com/doramart/DoraCMS/issues/268 exploit

github.com/doramart/DoraCMS/issues/268 issue-tracking

www.doracms.net/ product

www.vulncheck.com/...doracms-ueditor-remote-image-fetch-ssrf third-party-advisory

cve.org (CVE-2026-25870)

nvd.nist.gov (CVE-2026-25870)

Download JSON