CVE-2025-64327

Source
https://cve.org/CVERecord?id=CVE-2025-64327
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64327.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-64327
Aliases
  • GHSA-p52r-qq3j-8p78
Published
2025-11-06T21:07:17.672Z
Modified
2026-04-02T12:59:18.141660Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
ThinkDashboard: Blind Server-Side Request Forgery (SSRF) vulnerability in /api/ping Endpoint
Details

ThinkDashboard is a self-hosted bookmark dashboard built with Go and vanilla JavaScript. Versions 0.6.7 and below contain a Blind Server-Side Request Forgery (SSRF) vulnerability, in its /api/ping?url= endpoint. This allows an attacker to make arbitrary requests to internal or external hosts. This can include discovering ports open on the local machine, hosts on the local network, and ports open on the hosts on the internal network. This issue is fixed in version 0.6.8.

Database specific
{
    "cwe_ids": [
        "CWE-918"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64327.json"
}
References

Affected packages

Git / github.com/matiasdesuu/thinkdashboard

Affected ranges

Type
GIT
Repo
https://github.com/matiasdesuu/thinkdashboard
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.2
0.2.1
0.3
0.3.1
0.4
0.4.5
0.5
0.5.5
0.6
0.6.5
0.6.6
0.6.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64327.json"