CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-27501: Server Side Request Forgery in Ziti Console

8.6 CVSS

Description

OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability. The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions. This vulnerability is fixed in 3.7.1.

Classification

CVE ID: CVE-2025-27501

CVSS Base Severity: HIGH

CVSS Base Score: 8.6

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Problem Types

CWE-918: Server-Side Request Forgery (SSRF)

Affected Products

Vendor: openziti

Product: ziti-console

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 9.69% (scored less or equal to compared to others)

EPSS Date: 2025-04-01 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-27501
https://github.com/openziti/ziti-console/security/advisories/GHSA-fqxh-vfv5-8qjp

Timeline