Description
Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web).
Exploits (1)
References (3)
Core 3
Core References
Vendor Advisory
http://stimulsoft.com
Broken Link
https://cloud-trustit.spp.at/s/HjEksN86SfsMaJM
Exploit, Third Party Advisory
https://cves.at/posts/cve-2023-25262/writeup/
Scores
CVSS v3
7.5
EPSS
0.0086
EPSS Percentile
75.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-918
Status
published
Products (2)
stimulsoft/designer
2023.1.3
stimulsoft/designer
2023.1.4
Published
Mar 28, 2023
Tracked Since
Feb 18, 2026