CVE-2025-2997
Published: 31 March 2025
Description
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
Security Summary
CVE-2025-2997 is a server-side request forgery (SSRF) vulnerability, classified under CWE-918, affecting zhangyanbo2007 youkefu version 4.2.0. The flaw resides in an unknown function within the file /res/url, where manipulation of the "url" argument triggers the SSRF. Published on 2025-03-31, it has been rated critical with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
A remote attacker possessing low privileges (PR:L) can exploit this vulnerability over the network with low complexity and no user interaction required. Exploitation enables limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L) via SSRF, allowing the attacker to make unauthorized requests from the server.
VulDB advisories (ctiid.302046, id.302046, submit.524009) document the issue, while a GitHub repository at https://github.com/exp3n5ive/Vul/blob/main/youkefu/youkefu.pdf discloses a public exploit that may be used by attackers. No specific patches or mitigations are detailed in the provided references.
The exploit disclosure heightens the risk, as it is publicly available for potential weaponization.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
SSRF in public-facing web endpoint (/res/url) enables exploitation of public-facing applications (T1190) and facilitates internal network service discovery (T1046) by abusing server-side request capabilities.