Cyber Posture

CVE-2025-1833

MediumPublic PoC

Published: 02 March 2025

Published
02 March 2025
Modified
26 May 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0007 22.2th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1833 is a medium-severity SSRF (CWE-918) vulnerability in Zframeworks Zz. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Remote System Discovery (T1018); ranked at the 22.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Remote System Discovery (T1018) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates SSRF by validating the manipulated 'url' argument in the sendNotice function to ensure only safe inputs are accepted.

prevent

Restricts the 'url' parameter to authorized formats, domains, or schemes, preventing forgery to unintended destinations.

prevent

Enforces approved information flows from the HTTP Request Handler, blocking unauthorized server-side requests triggered by the vulnerable function.

MITRE ATT&CK Enterprise TechniquesAI

T1018 Remote System Discovery Discovery
Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SSRF in public-facing HTTP endpoint (T1190) enables attackers to forge requests for internal remote system discovery (T1018) and network service discovery (T1046).

NVD Description

A vulnerability, which was classified as critical, has been found in zj1983 zz up to 2024-8. Affected by this issue is the function sendNotice of the file src/main/java/com/futvan/z/erp/customer_notice/Customer_noticeAction.java of the component HTTP Request Handler. The manipulation of the argument url…

more

leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-1833 is a server-side request forgery (SSRF) vulnerability classified as critical in the zj1983 zz software up to version 2024-8. It affects the sendNotice function within the file src/main/java/com/futvan/z/erp/customer_notice/Customer_noticeAction.java, part of the HTTP Request Handler component. The issue, tied to CWE-918, arises from manipulation of the url argument and carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L). The vulnerability was published on 2025-03-02.

Attackers with low privileges (PR:L) can exploit this remotely over the network with low complexity and no user interaction required. By supplying a malicious url argument to the sendNotice function, they can force the server to make unintended requests, potentially leading to limited impacts on confidentiality, integrity, and availability as per the CVSS vector.

Advisories from VulDB and GitHub repositories detail the issue, including a public proof-of-concept exploit. The vendor was contacted early but provided no response, and no patches or official mitigations are mentioned in the available references.

The exploit has been publicly disclosed and may be actively used, increasing the risk for exposed instances of affected zj1983 zz deployments.

Details

CWE(s)

Affected Products

zframeworks
zz
≤ 2024-8

CVEs Like This One

CVE-2025-1849Same product: Zframeworks Zz
CVE-2025-1848Same product: Zframeworks Zz
CVE-2025-1831Same product: Zframeworks Zz
CVE-2025-1834Same product: Zframeworks Zz
CVE-2025-1820Same product: Zframeworks Zz
CVE-2025-1818Same product: Zframeworks Zz
CVE-2025-1832Same product: Zframeworks Zz
CVE-2025-1821Same product: Zframeworks Zz
CVE-2025-1812Same product: Zframeworks Zz
CVE-2025-1847Same product: Zframeworks Zz

References