CVE-2025-27501

OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability. The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions. This vulnerability is fixed in 3.7.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openziti:openziti:*:*:*:*:*:*:*:*

History

23 Apr 2025, 18:45

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.6

05 Mar 2025, 20:16

Type Values Removed Values Added
First Time Openziti
Openziti openziti
CPE cpe:2.3:a:openziti:openziti:*:*:*:*:*:*:*:*
References () https://github.com/openziti/ziti-console/security/advisories/GHSA-fqxh-vfv5-8qjp - () https://github.com/openziti/ziti-console/security/advisories/GHSA-fqxh-vfv5-8qjp - Third Party Advisory

03 Mar 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-03 19:15

Updated : 2025-04-23 18:45


NVD link : CVE-2025-27501

Mitre link : CVE-2025-27501


JSON object : View

Products Affected

openziti

  • openziti
CWE
CWE-918

Server-Side Request Forgery (SSRF)