Platform
other
Component
ziti-console
Fixed in
3.7.2
CVE-2025-27501 describes a Server-Side Request Forgery (SSRF) vulnerability discovered in the Ziti Console. This flaw allows an attacker to manipulate the console into making requests to arbitrary internal or external resources. The vulnerability impacts Ziti Console versions 3.7.1 and earlier, and a fix is available in version 3.7.1.
The SSRF vulnerability in Ziti Console allows an attacker to craft a malicious URL parameter that triggers the console to make requests to unintended destinations. This can lead to unauthorized access to internal services, data exfiltration, and potentially even remote code execution if the targeted internal service is vulnerable. An attacker could leverage this to scan internal networks, access sensitive configuration files, or interact with other internal applications without proper authentication. The potential blast radius extends to any internal resource accessible via HTTP or HTTPS from the Ziti Console server.
CVE-2025-27501 was publicly disclosed on 2025-03-03. No public proof-of-concept (PoC) code has been released as of this writing. The vulnerability is not currently listed on the CISA KEV catalog. The probability of exploitation is currently assessed as medium, given the ease of exploitation once a vulnerable instance is identified.
Exploit Status
EPSS
0.10% (28% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2025-27501 is to upgrade Ziti Console to version 3.7.1 or later. This version moves the request handling from the server-side to the client-side, effectively eliminating the SSRF vulnerability. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) with rules to block requests containing suspicious URL parameters. Thoroughly review and restrict network access to the Ziti Console server to limit the potential impact of a successful SSRF attack. After upgrade, confirm the fix by attempting to trigger the vulnerable endpoint with a crafted URL and verifying that the request is properly handled by the client.
Update Ziti Console to version 3.7.1 or higher. This version fixes the SSRF vulnerability by moving the request from the server side to the client side to the external controller. This eliminates the possibility of the node identity being used to obtain additional permissions.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-27501 is a Server-Side Request Forgery (SSRF) vulnerability affecting Ziti Console versions 3.7.1 and earlier, allowing attackers to forge requests to internal resources.
You are affected if you are running Ziti Console version 3.7.1 or earlier. Upgrade to 3.7.1 to mitigate the vulnerability.
Upgrade Ziti Console to version 3.7.1 or later. Consider implementing a WAF as a temporary workaround if upgrading is not immediately possible.
There is no confirmed active exploitation of CVE-2025-27501 at this time, but the vulnerability is considered potentially exploitable.
Refer to the official OpenZiti security advisory for details: [https://www.openziti.io/security/advisories](https://www.openziti.io/security/advisories)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.