A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://vufind.org/wiki/security:cve-2024-25738 |
|
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openlibraryfoundation
Openlibraryfoundation vufind |
|
| CPEs | cpe:2.3:a:openlibraryfoundation:vufind:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openlibraryfoundation
Openlibraryfoundation vufind |
|
| Metrics |
ssvc
|
Thu, 22 Aug 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-918 | |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:47:12.407Z
Reserved: 2024-02-11T00:00:00.000Z
Link: CVE-2024-25738
Updated: 2024-08-01T23:52:05.977Z
Status : Awaiting Analysis
Published: 2024-05-22T19:15:08.807
Modified: 2024-11-21T09:01:18.627
Link: CVE-2024-25738
No data.