CVE-2025-71258
Published: 19 March 2026
Summary
CVE-2025-71258 is a medium-severity SSRF (CWE-918) vulnerability in Bmc Footprints Itsm. Its CVSS base score is 4.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Service Discovery (T1046); ranked in the top 16.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the SSRF vulnerability by requiring timely application of BMC's specified hotfixes for affected FootPrints ITSM versions.
Addresses the root cause of improper URL validation in the searchWeb API by enforcing validation of inputs to prevent arbitrary outbound server requests.
Mitigates exploitation by monitoring and controlling outbound communications from the server to block unauthorized internal network scanning or service interactions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Blind SSRF enables internal network/service scanning from the compromised server via arbitrary outbound requests.
NVD Description
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind server-side request forgery vulnerability in the searchWeb API component that allows authenticated attackers to cause the server to initiate arbitrary outbound requests. Attackers can exploit improper URL validation to perform…
more
internal network scanning or interact with internal services, impacting system availability. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
Deeper analysisAI
CVE-2025-71258, published on 2026-03-19, is a blind server-side request forgery (SSRF) vulnerability (CWE-918) in the searchWeb API component of BMC FootPrints ITSM software. It affects versions 20.20.02 through 20.24.01.001 due to improper URL validation, enabling authenticated attackers to force the server to make arbitrary outbound requests.
Attackers with network access and low privileges (CVSS 4.3: AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) can exploit this vulnerability without user interaction. Successful exploitation allows internal network scanning or interaction with internal services, potentially impacting system availability through reconnaissance or service abuse.
BMC advises applying specific hotfixes to remediate the issue: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01. Official release notes and advisories from VulnCheck and WatchTowr Labs provide further details on the vulnerability and patching guidance.
Details
- CWE(s)