Server-Side Request Forgery in Mogu Blog from Moxi624
CVE-2026-6625
Key Information:
- Vendor
Moxi624
- Status
- Vendor
- CVE Published:
- 20 April 2026
Badges
What is CVE-2026-6625?
A vulnerability has been identified in Mogu Blog v2 up to version 5.2, specifically in the LocalFileServiceImpl.uploadPictureByUrl function. This flaw allows attackers to exploit the Picture Storage Service, potentially initiating a server-side request forgery (SSRF) attack remotely. The nature of this vulnerability enables unauthorized access to internal resources, leading to possible data leakage or further exploitation. Despite being notified about this issue, the vendor has not issued a response to patch the vulnerability.
Affected Version(s)
Mogu Blog v2 5.0
Mogu Blog v2 5.1
Mogu Blog v2 5.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
