A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://vufind.org/wiki/security:cve-2024-25738 |
![]() ![]() |
History
Thu, 13 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openlibraryfoundation
Openlibraryfoundation vufind |
|
CPEs | cpe:2.3:a:openlibraryfoundation:vufind:*:*:*:*:*:*:*:* | |
Vendors & Products |
Openlibraryfoundation
Openlibraryfoundation vufind |
|
Metrics |
ssvc
|
Thu, 22 Aug 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-918 | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2024-05-22T18:56:47.568Z
Updated: 2025-02-13T15:47:12.407Z
Reserved: 2024-02-11T00:00:00.000Z
Link: CVE-2024-25738

Updated: 2024-08-01T23:52:05.977Z

Status : Awaiting Analysis
Published: 2024-05-22T19:15:08.807
Modified: 2024-11-21T09:01:18.627
Link: CVE-2024-25738

No data.