Typecho <= 1.3.0 Server-Side Request Forgery Vulnerability (CVE-2026-7025)
A server-side request forgery (SSRF) vulnerability exists in Typecho up to version 1.3.0, allowing remote attackers to manipulate the X-Pingback/link argument in the Service::sendPingHandle function to potentially make arbitrary HTTP requests.
Typecho is vulnerable to a server-side request forgery (SSRF) vulnerability (CVE-2026-7025) affecting versions up to 1.3.0. The vulnerability resides in the Service::sendPingHandle function within the var/Widget/Service.php file, specifically impacting the Ping Back Service Endpoint component. An attacker can remotely trigger this vulnerability by manipulating the X-Pingback/link argument. Publicly available exploits exist, increasing the risk of exploitation. The vendor was notified but did not respond. This vulnerability allows an attacker to potentially make arbitrary HTTP requests from the server, leading to information disclosure or further compromise.
Attack Chain
- The attacker identifies a Typecho instance running a vulnerable version (<= 1.3.0).
- The attacker crafts a malicious HTTP request targeting the Pingback service endpoint.
- The malicious request includes a manipulated
X-Pingbackorlinkargument pointing to an attacker-controlled server or internal resource. - The
Service::sendPingHandlefunction processes the request and attempts to fetch the resource specified in theX-Pingback/linkargument. - Due to the SSRF vulnerability, the Typecho server makes an outbound HTTP request to the attacker-specified URL.
- The attacker’s server logs the incoming request from the Typecho server, confirming the SSRF vulnerability.
- The attacker could potentially use this SSRF vulnerability to scan internal networks, read sensitive files, or interact with internal services.
- Successful exploitation could lead to information disclosure, further exploitation of internal services, or denial-of-service attacks.
Impact
Successful exploitation of CVE-2026-7025 can allow an attacker to perform unauthorized actions on the internal network of the Typecho server. This includes port scanning, accessing internal services, and potentially reading sensitive data. The number of affected installations is unknown, but any Typecho instance running version 1.3.0 or earlier is vulnerable. The impact is limited to the permissions of the Typecho web server process, but can expose sensitive internal services that are not directly accessible from the internet.
Recommendation
- Apply input validation and sanitization to the
X-Pingback/linkargument to prevent arbitrary URL inclusion, mitigating CVE-2026-7025. - Monitor web server logs for suspicious requests containing unusual URLs in the
X-Pingbackheader, which can indicate SSRF attempts. - Implement network segmentation to limit the impact of potential SSRF attacks by restricting the web server’s access to internal resources.
- Deploy the Sigma rule
Detect Suspicious X-Pingback Headerto identify potential SSRF attempts targeting the Pingback service. - Audit outbound network connections from the web server to detect unauthorized access to internal resources as a result of SSRF.
Detection coverage 2
Detect Suspicious X-Pingback Header
mediumDetects suspicious outbound connections initiated by a web server due to a manipulated X-Pingback header, indicating a potential SSRF vulnerability exploitation.
Typecho SSRF - External URL in X-Pingback Header
mediumDetects potential SSRF attempts in Typecho by monitoring for X-Pingback headers containing URLs pointing to external domains.
Detection queries are kept inside the platform. Get full rules →