Cyber Posture

CVE-2025-25301

HighPublic PoC

Published: 03 March 2025

Published
03 March 2025
Modified
07 March 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0004 12.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-25301 is an information disclosure vulnerability in Rembg, a tool for removing image backgrounds, affecting versions 2.0.57 and earlier. The issue stems from the /api/remove endpoint, which accepts a URL query parameter to fetch, process, and return an image. An attacker can supply an internal network URL via this parameter, causing the rembg server to retrieve and expose images hosted on its internal network. This flaw is classified as CWE-918 (Server-Side Request Forgery) with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact.

Any unauthenticated remote attacker with network access to the rembg server can exploit this vulnerability. By crafting a request to the /api/remove endpoint with a URL pointing to an internal resource, such as a private image server, the attacker tricks the server into fetching the image, processing it for background removal, and returning the result. This enables unauthorized viewing of sensitive internal images without requiring privileges or user interaction.

The GitHub Security Lab advisory (GHSL-2024-161 and GHSL-2024-162) provides further details on this vulnerability at https://securitylab.github.com/advisories/GHSL-2024-161_GHSL-2024-162_rembg/. Security practitioners should consult this reference for recommended mitigations and patches.

Details

CWE(s)
CWE-918

Affected Products

danielgatis
rembg
≤ 2.0.57

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SSRF vulnerability in public-facing /api/remove endpoint enables remote unauthenticated exploitation of the application to access internal resources.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References