- Description
- WonderCMS 3.5.0 is vulnerable to Server-Side Request Forgery (SSRF) in the custom module installation functionality. An authenticated administrator can supply a malicious URL via the pluginThemeUrl POST parameter. The server fetches the provided URL using curl_exec() without sufficient validation, allowing the attacker to force internal or external HTTP requests.
- Source
- cve@mitre.org
- NVD status
- Analyzed
- Products
- wondercms
CVSS 3.1
- Type
- Secondary
- Base score
- 6.5
- Impact score
- 5.2
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
- Severity
- MEDIUM
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-918
- Hype score
- Not currently trending
CVE-2025-57055 WonderCMS 3.5.0 is vulnerable to Server-Side Request Forgery (SSRF) in the custom module installation functionality. An authenticated administrator can supply a malic… https://t.co/k6zEIn9Xzs
@CVEnew
19 Sept 2025
263 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-57055 CVE-2025-57055 https://t.co/2F4cbwDDsX
@VulmonFeeds
8 Sept 2025
93 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wondercms:wondercms:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EC67D39B-2448-481D-83A1-ACD89777F238",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]