CVE-2023-25262

HIGH

Stimulsoft Designer - SSRF

Title source: rule
STIX 2.1

Description

Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web).

Exploits (1)

nomisec WRITEUP
by trustcves · poc
https://github.com/trustcves/CVE-2023-25262

References (3)

Core 3
Core References
Vendor Advisory
http://stimulsoft.com
Exploit, Third Party Advisory
https://cves.at/posts/cve-2023-25262/writeup/

Scores

CVSS v3 7.5
EPSS 0.0086
EPSS Percentile 75.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-918
Status published
Products (2)
stimulsoft/designer 2023.1.3
stimulsoft/designer 2023.1.4
Published Mar 28, 2023
Tracked Since Feb 18, 2026