Description

OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability. The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions. This vulnerability is fixed in 3.7.1.

INFO

Published Date :

2025-03-03T18:33:19.670Z

Last Modified :

2025-03-03T19:10:02.275Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-27501 vulnerability.

Vendors Products
Openziti
  • Openziti
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-27501.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact