DoraCMS version 3.1 and prior contains a server-side request forgery (SSRF) vulnerability in its UEditor remote image fetch functionality. The application accepts user-supplied URLs and performs server-side HTTP or HTTPS requests without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal or private IP address ranges, or apply request timeouts or response size limits. An attacker can abuse this behavior to induce the server to issue outbound requests to arbitrary hosts, including internal network resources, potentially enabling internal network scanning and denial of service through resource exhaustion.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Doramart
Doramart doracms |
|
| Vendors & Products |
Doramart
Doramart doracms |
|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 10 Feb 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | DoraCMS version 3.1 and prior contains a server-side request forgery (SSRF) vulnerability in its UEditor remote image fetch functionality. The application accepts user-supplied URLs and performs server-side HTTP or HTTPS requests without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal or private IP address ranges, or apply request timeouts or response size limits. An attacker can abuse this behavior to induce the server to issue outbound requests to arbitrary hosts, including internal network resources, potentially enabling internal network scanning and denial of service through resource exhaustion. | |
| Title | DoraCMS <= 3.1 UEditor Remote Image Fetch SSRF | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-02-10T22:16:28.212Z
Updated: 2026-02-11T21:43:08.107Z
Reserved: 2026-02-06T19:12:03.464Z
Link: CVE-2026-25870
Updated: 2026-02-11T21:42:55.844Z
Status : Awaiting Analysis
Published: 2026-02-10T23:16:16.287
Modified: 2026-02-11T22:15:50.797
Link: CVE-2026-25870
No data.