OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability. The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions. This vulnerability is fixed in 3.7.1.
History

Wed, 05 Mar 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Openziti
Openziti openziti
CPEs cpe:2.3:a:openziti:openziti:*:*:*:*:*:*:*:*
Vendors & Products Openziti
Openziti openziti

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Mar 2025 18:45:00 +0000

Type Values Removed Values Added
Description OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability. The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions. This vulnerability is fixed in 3.7.1.
Title Server Side Request Forgery in Ziti Console
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-03-03T18:33:19.670Z

Updated: 2025-03-03T19:10:02.275Z

Reserved: 2025-02-26T18:11:52.304Z

Link: CVE-2025-27501

cve-icon Vulnrichment

Updated: 2025-03-03T19:09:16.168Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-03T19:15:36.300

Modified: 2025-03-05T20:16:46.363

Link: CVE-2025-27501

cve-icon Redhat

No data.