Server-Side Request Forgery Vulnerability in Thinkgem JeeSite - UEditor Image Grabber
CVE-2025-7759

5.3MEDIUM

Key Information:

Vendor

Thinkgem

Status
Vendor
CVE Published:
17 July 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-7759?

A vulnerability was discovered in the UEditor Image Grabber component of Thinkgem JeeSite, allowing for server-side request forgery (SSRF). This issue arises from improper handling of the argument Source within the ActionEnter.java file. Remote attackers can exploit this vulnerability to manipulate server requests, potentially leading to unauthorized access or data exposure. A patch has been provided to address this issue; users are advised to apply it to secure their applications.

Affected Version(s)

JeeSite 5.0

JeeSite 5.1

JeeSite 5.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

ZAST.AI (VulDB User)
.
CVE-2025-7759 : Server-Side Request Forgery Vulnerability in Thinkgem JeeSite - UEditor Image Grabber