CVE-2025-1833
Published: 02 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-1833 is a server-side request forgery (SSRF) vulnerability classified as critical in the zj1983 zz software up to version 2024-8. It affects the sendNotice function within the file src/main/java/com/futvan/z/erp/customer_notice/Customer_noticeAction.java, part of the HTTP Request Handler component. The issue, tied to CWE-918, arises from manipulation of the url argument and carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L). The vulnerability was published on 2025-03-02.
Attackers with low privileges (PR:L) can exploit this remotely over the network with low complexity and no user interaction required. By supplying a malicious url argument to the sendNotice function, they can force the server to make unintended requests, potentially leading to limited impacts on confidentiality, integrity, and availability as per the CVSS vector.
Advisories from VulDB and GitHub repositories detail the issue, including a public proof-of-concept exploit. The vendor was contacted early but provided no response, and no patches or official mitigations are mentioned in the available references.
The exploit has been publicly disclosed and may be actively used, increasing the risk for exposed instances of affected zj1983 zz deployments.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
SSRF in public-facing HTTP endpoint (T1190) enables attackers to forge requests for internal remote system discovery (T1018) and network service discovery (T1046).