Vulnerability Description
InstantCMS is a free and open source content management system. A blind Server-Side Request Forgery (SSRF) vulnerability in InstantCMS up to and including 2.17.3 allows authenticated remote attackers to make nay HTTP/HTTPS request via the package parameter. It is possible to make any HTTP/HTTPS request to any website in installer functionality. Due to such vulnerability it is possible to for example scan local network, call local services and its functions, conduct a DoS attack, and/or disclose a server's real IP if it's behind a reverse proxy. It is also possible to exhaust server resources by sending plethora of such requests. As of time of publication, no patched releases are available.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Instantcms | Instantcms | <= 2.17.3 |
Related Weaknesses (CWE)
References
- https://github.com/instantsoft/icms2/commit/fa997bdab3429fad0c850966bfacbcb96d5aPatch
- https://github.com/instantsoft/icms2/security/advisories/GHSA-79hh-mhvg-whrwExploitVendor Advisory
FAQ
What is CVE-2025-59055?
CVE-2025-59055 is a vulnerability with a CVSS score of 4.7 (MEDIUM). InstantCMS is a free and open source content management system. A blind Server-Side Request Forgery (SSRF) vulnerability in InstantCMS up to and including 2.17.3 allows authenticated remote attackers ...
How severe is CVE-2025-59055?
CVE-2025-59055 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-59055?
Check the references section above for vendor advisories and patch information. Affected products include: Instantcms Instantcms.