Cyber Posture

CVE-2025-2997

MediumPublic PoC

Published: 31 March 2025

Published
31 March 2025
Modified
10 October 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0031 54.1th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.

Security Summary

CVE-2025-2997 is a server-side request forgery (SSRF) vulnerability, classified under CWE-918, affecting zhangyanbo2007 youkefu version 4.2.0. The flaw resides in an unknown function within the file /res/url, where manipulation of the "url" argument triggers the SSRF. Published on 2025-03-31, it has been rated critical with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

A remote attacker possessing low privileges (PR:L) can exploit this vulnerability over the network with low complexity and no user interaction required. Exploitation enables limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L) via SSRF, allowing the attacker to make unauthorized requests from the server.

VulDB advisories (ctiid.302046, id.302046, submit.524009) document the issue, while a GitHub repository at https://github.com/exp3n5ive/Vul/blob/main/youkefu/youkefu.pdf discloses a public exploit that may be used by attackers. No specific patches or mitigations are detailed in the provided references.

The exploit disclosure heightens the risk, as it is publicly available for potential weaponization.

Details

CWE(s)
CWE-918

Affected Products

zhangyanbo2007
youkefu
4.2.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
Why these techniques?

SSRF in public-facing web endpoint (/res/url) enables exploitation of public-facing applications (T1190) and facilitates internal network service discovery (T1046) by abusing server-side request capabilities.

References