ThinkDashboard is a self-hosted bookmark dashboard built with Go and vanilla JavaScript. Versions 0.6.7 and below contain a Blind Server-Side Request Forgery (SSRF) vulnerability, in its `/api/ping?url= endpoint`. This allows an attacker to make arbitrary requests to internal or external hosts. This can include discovering ports open on the local machine, hosts on the local network, and ports open on the hosts on the internal network. This issue is fixed in version 0.6.8.
References
| Link | Resource |
|---|---|
| https://github.com/MatiasDesuu/ThinkDashboard/commit/16976263b22a4b0526b2c7c30294cc099258edae | Patch |
| https://github.com/MatiasDesuu/ThinkDashboard/releases/tag/0.6.8 | Release Notes |
| https://github.com/MatiasDesuu/ThinkDashboard/security/advisories/GHSA-p52r-qq3j-8p78 | Exploit Vendor Advisory |
| https://github.com/MatiasDesuu/ThinkDashboard/security/advisories/GHSA-p52r-qq3j-8p78 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-11-06 21:15
Updated : 2025-11-21 16:40
NVD link : CVE-2025-64327
Mitre link : CVE-2025-64327
CVE.ORG link : CVE-2025-64327
JSON object : View
Products Affected
matiasdesuu
- thinkdashboard
CWE
CWE-918
Server-Side Request Forgery (SSRF)
