PatchSiren cyber security CVE debrief
CVE-2017-5518 Metalgenix CVE debrief
CVE-2017-5518 describes a server-side request forgery (SSRF) weakness in the GeniXCMS media-file upload feature affecting versions through 0.0.8. The issue can let a remote attacker submit a URL that causes the application to make unexpected server-side requests, including toward intranet addresses. NVD assigns CWE-918 and a HIGH severity score (CVSS 3.0: 7.4), reflecting the potential for impact beyond the application boundary.
- Vendor
- Metalgenix
- Product
- CVE-2017-5518
- CVSS
- HIGH 7.4
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-17
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-17
- Advisory updated
- 2026-05-13
Who should care
Administrators, developers, and security teams running GeniXCMS through 0.0.8 should treat this as high priority, especially if the media-upload workflow accepts user-controlled URLs or can reach internal network resources.
Technical summary
The vulnerable feature is the media-file upload path, which accepts a URL and may fetch it server-side. NVD classifies the weakness as CWE-918 (SSRF) with vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N. That combination indicates unauthenticated network reachability, user interaction, and the possibility of the vulnerable server being induced to interact with unintended internal or adjacent systems.
Defensive priority
High. SSRF in a web-facing upload path can expose internal services, metadata endpoints, or network-only resources even without direct authentication.
Recommended defensive actions
- Identify any GeniXCMS deployment at version 0.0.8 or earlier and assume the media-upload URL path is exposed until verified otherwise.
- Restrict or disable remote URL fetching in the media upload feature if it is not required.
- Enforce strict allowlists for outbound destinations and block private, loopback, link-local, and other reserved address ranges.
- Limit acceptable URL schemes and reject non-HTTP(S) inputs if the feature must remain enabled.
- Apply the project fix or remediation referenced in the linked issue tracker before re-enabling URL-based media ingestion.
- Monitor outbound requests from the application and review logs for requests targeting internal or unusual network locations.
Evidence notes
The CVE record and NVD detail both identify GeniXCMS through 0.0.8 as vulnerable and classify the weakness as CWE-918. The supplied references include a SecurityFocus BID entry and a GitHub issue tagged with exploit, issue tracking, and patch, which supports remediation context without adding unsupported details.
Official resources
-
CVE-2017-5518 CVE record
CVE.org
-
CVE-2017-5518 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Exploit, Issue Tracking, Patch, Third Party Advisory
CVE published on 2017-01-17. The supplied NVD source metadata was later modified on 2026-05-13, but that is not the original issue date.