CVE-2025-13789

A vulnerability was found in ZenTao up to 21.7.6-8564. This affects the function makeRequest of the file module/ai/model.php. The manipulation of the argument Base results in server-side request forgery. The attack can be launched remotely. The exploit has been made public and could be used. Upgrading to version 21.7.6 mitigates this issue. It is suggested to upgrade the affected component.
References
Link Resource
https://github.com/ez-lbz/ez-lbz.github.io/issues/2 Exploit Issue Tracking Vendor Advisory
https://github.com/ez-lbz/ez-lbz.github.io/issues/2#issue-3598317459 Exploit Issue Tracking Vendor Advisory
https://github.com/ez-lbz/ez-lbz.github.io/issues/2#issuecomment-3540247346 Exploit Issue Tracking
https://vuldb.com/?ctiid.333793 Permissions Required VDB Entry
https://vuldb.com/?id.333793 Third Party Advisory VDB Entry
https://vuldb.com/?submit.690728 Third Party Advisory VDB Entry
https://www.zentao.net/extension-viewext-6.html Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:zentao:zentao:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-11-30 14:16

Updated : 2025-12-04 16:36


NVD link : CVE-2025-13789

Mitre link : CVE-2025-13789

CVE.ORG link : CVE-2025-13789


JSON object : View

Products Affected

zentao

  • zentao
CWE
CWE-918

Server-Side Request Forgery (SSRF)