<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Typecho (&lt;= 1.3.0) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/typecho--1.3.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 26 Apr 2026 08:17:46 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/typecho--1.3.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>Typecho &lt;= 1.3.0 Server-Side Request Forgery Vulnerability (CVE-2026-7025)</title><link>https://feed.craftedsignal.io/briefs/2026-04-typecho-ssrf/</link><pubDate>Sun, 26 Apr 2026 08:17:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-typecho-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in Typecho up to version 1.3.0, allowing remote attackers to manipulate the X-Pingback/link argument in the Service::sendPingHandle function to potentially make arbitrary HTTP requests.</description><content:encoded><![CDATA[<p>Typecho is vulnerable to a server-side request forgery (SSRF) vulnerability (CVE-2026-7025) affecting versions up to 1.3.0. The vulnerability resides in the <code>Service::sendPingHandle</code> function within the <code>var/Widget/Service.php</code> file, specifically impacting the Ping Back Service Endpoint component. An attacker can remotely trigger this vulnerability by manipulating the <code>X-Pingback/link</code> argument. Publicly available exploits exist, increasing the risk of exploitation. The vendor was notified but did not respond. This vulnerability allows an attacker to potentially make arbitrary HTTP requests from the server, leading to information disclosure or further compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Typecho instance running a vulnerable version (&lt;= 1.3.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the Pingback service endpoint.</li>
<li>The malicious request includes a manipulated <code>X-Pingback</code> or <code>link</code> argument pointing to an attacker-controlled server or internal resource.</li>
<li>The <code>Service::sendPingHandle</code> function processes the request and attempts to fetch the resource specified in the <code>X-Pingback/link</code> argument.</li>
<li>Due to the SSRF vulnerability, the Typecho server makes an outbound HTTP request to the attacker-specified URL.</li>
<li>The attacker&rsquo;s server logs the incoming request from the Typecho server, confirming the SSRF vulnerability.</li>
<li>The attacker could potentially use this SSRF vulnerability to scan internal networks, read sensitive files, or interact with internal services.</li>
<li>Successful exploitation could lead to information disclosure, further exploitation of internal services, or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7025 can allow an attacker to perform unauthorized actions on the internal network of the Typecho server. This includes port scanning, accessing internal services, and potentially reading sensitive data. The number of affected installations is unknown, but any Typecho instance running version 1.3.0 or earlier is vulnerable. The impact is limited to the permissions of the Typecho web server process, but can expose sensitive internal services that are not directly accessible from the internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>X-Pingback/link</code> argument to prevent arbitrary URL inclusion, mitigating CVE-2026-7025.</li>
<li>Monitor web server logs for suspicious requests containing unusual URLs in the <code>X-Pingback</code> header, which can indicate SSRF attempts.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks by restricting the web server&rsquo;s access to internal resources.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious X-Pingback Header</code> to identify potential SSRF attempts targeting the Pingback service.</li>
<li>Audit outbound network connections from the web server to detect unauthorized access to internal resources as a result of SSRF.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-7025</category><category>typecho</category></item></channel></rss>