Server-Side Request Forgery in Mogu Blog from Moxi624
CVE-2026-6625

6.9MEDIUM

Key Information:

Vendor

Moxi624

Vendor
CVE Published:
20 April 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-6625?

A vulnerability has been identified in Mogu Blog v2 up to version 5.2, specifically in the LocalFileServiceImpl.uploadPictureByUrl function. This flaw allows attackers to exploit the Picture Storage Service, potentially initiating a server-side request forgery (SSRF) attack remotely. The nature of this vulnerability enables unauthorized access to internal resources, leading to possible data leakage or further exploitation. Despite being notified about this issue, the vendor has not issued a response to patch the vulnerability.

Affected Version(s)

Mogu Blog v2 5.0

Mogu Blog v2 5.1

Mogu Blog v2 5.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

cccccccti (VulDB User)
VulDB CNA Team
.