Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-32355

EPSS 1.99% · P84
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-32355

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Rocket TRUfusion Enterprise through 7.10.4.0 uses a reverse proxy to handle incoming connections. However, the proxy is misconfigured in a way that allows specifying absolute URLs in the HTTP request line, causing the proxy to load the given resource.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Rocket TRUfusion Enterprise 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Rocket TRUfusion Enterprise是美国Rocket公司的一个产品生命周期管理平台。 Rocket TRUfusion Enterprise 7.10.4.0及之前版本存在安全漏洞,该漏洞源于反向代理配置不当,允许在HTTP请求行中指定绝对URL,导致代理加载给定资源。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2025-32355

#POC DescriptionSource LinkShenlong Link
1Rocket TRUfusion Enterprise through 7.10.4.0 uses a reverse proxy to handle incoming connections. However, the proxy is misconfigured in a way that allows specifying absolute URLs in the HTTP request line, causing the proxy to load the given resource. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-32355.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-32355

登录查看更多情报信息。

Same Patch Batch · n/a · 2026-02-17 · 17 CVEs total

CVE-2026-26236.3 MEDIUMBlossom File Upload BLOSManager.java put path traversal
CVE-2026-26223.5 LOWBlossom Article Title ArticleController.java content cross site scripting
CVE-2026-26731TOTOLINK A3002RU 缓冲区错误漏洞
CVE-2026-26736TOTOLINK A3002RU 缓冲区错误漏洞
CVE-2026-26732TOTOLINK A3002RU 缓冲区错误漏洞
CVE-2024-55270PHPGurukul Student Management System 安全漏洞
CVE-2024-55271PHPGurukul Gym Management System 安全漏洞
CVE-2025-59793Rocket TRUfusion Enterprise 安全漏洞
CVE-2025-70829datart 安全漏洞
CVE-2025-70830datart 安全漏洞
CVE-2025-70828datart 安全漏洞
CVE-2025-70846aidigu 安全漏洞
CVE-2025-70397JIZHICMS(极致CMS) 安全漏洞
CVE-2025-67905Malwarebytes AdwCleaner 安全漏洞
CVE-2025-67102Jorani 安全漏洞
CVE-2025-65753Gryphon Guardian WiFi access point 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2025-32355

No comments yet


Leave a comment