Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 15 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Server‑Side Request Forgery in User Evaluation, Message, and Comment Modules of Jizhicms v2.5.4 |
Tue, 14 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jizhicms
Jizhicms jizhicms |
|
| CPEs | cpe:2.3:a:jizhicms:jizhicms:2.5.4:*:*:*:*:*:*:* | |
| Vendors & Products |
Jizhicms
Jizhicms jizhicms |
Tue, 14 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 10 Apr 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Server‑Side Request Forgery in User Evaluation, Message, and Comment Modules of Jizhicms v2.5.4 | |
| Weaknesses | CWE-918 |
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cherry-toto
Cherry-toto jizhicms |
|
| Vendors & Products |
Cherry-toto
Cherry-toto jizhicms |
Thu, 09 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jizhicms v2.5.4 is vulnerable to Server-Side Request Forgery (SSRF) in User Evaluation, Message, and Comment modules. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-14T16:35:45.324Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50228
Updated: 2026-04-14T14:40:28.942Z
Status : Analyzed
Published: 2026-04-09T15:16:07.433
Modified: 2026-04-14T20:11:40.267
Link: CVE-2025-50228
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:00:07Z