{"id":59709,"date":"2025-07-28T16:44:37","date_gmt":"2025-07-28T16:44:37","guid":{"rendered":""},"modified":"2025-08-09T18:15:08","modified_gmt":"2025-08-10T00:15:08","slug":"cve-2025-54122-unauthenticated-full-read-ssrf-vulnerability-in-manager-io-manager-accounting-software","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-54122-unauthenticated-full-read-ssrf-vulnerability-in-manager-io-manager-accounting-software\/","title":{"rendered":"<strong>CVE-2025-54122: Unauthenticated Full Read SSRF Vulnerability in Manager-io\/Manager Accounting Software<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>A critical security vulnerability, tagged as CVE-2025-54122, has been identified in the Manager-io\/Manager accounting software. This vulnerability, an unauthenticated full read Server-Side Request Forgery (SSRF), affects both the Desktop and Server editions of the software. It <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-41666-watchdog-file-replacement-vulnerability-allowing-remote-access-and-control\/\"  data-wpil-monitor-id=\"68835\">allows attackers to bypass network isolation and access<\/a> restrictions, potentially gaining access to internal services, cloud metadata endpoints, and facilitating the exfiltration of sensitive data from isolated network segments. This vulnerability is of significant concern to all users of <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50105-critical-vulnerability-in-oracle-universal-work-queue-allowing-unauthorized-data-access\/\"  data-wpil-monitor-id=\"68834\">Manager-io\/Manager<\/a> version up to and including 25.7.18.2519 due to its potential for system compromise or data leakage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-54122<br \/>\nSeverity: Critical (CVSS 10.0)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: Full read SSRF, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-31278-memory-corruption-vulnerability-with-potential-system-compromise\/\"  data-wpil-monitor-id=\"70647\">potentially leading to system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-3587498811\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Manager-io\/Manager Desktop Edition | Up to and including 25.7.18.2519<br \/>\nManager-io\/Manager Server Edition | Up to and including 25.7.18.2519<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43233-critical-https-proxy-vulnerability-allowing-sensitive-data-access\/\"  data-wpil-monitor-id=\"69381\">vulnerability stems from an issue in the proxy<\/a> handler component of Manager-io\/Manager. A malicious actor can send a carefully crafted request to the server, leveraging the SSRF <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52448-critical-authorization-bypass-vulnerability-in-salesforce-tableau-server\/\"  data-wpil-monitor-id=\"68833\">vulnerability to bypass<\/a> network isolation measures. This allows the attacker to make requests to internal services or cloud metadata endpoints under the guise of the vulnerable server, potentially gaining <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5835-droip-plugin-for-wordpress-unauthorized-access-and-modification-vulnerability\/\"  data-wpil-monitor-id=\"69382\">unauthorized access<\/a> to sensitive data or system resources.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-4101940311\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a hypothetical HTTP <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36845-server-side-request-forgery-ssrf-vulnerability-in-eveo-urve-web-manager\/\"  data-wpil-monitor-id=\"70646\">request that an attacker might use to exploit this vulnerability<\/a>:<\/p>\n<pre><code class=\"\" data-line=\"\">GET \/proxy?target=http:\/\/internal-service.example.com\/ HTTP\/1.1\nHost: vulnerable-manager.example.com<\/code><\/pre>\n<p>In this example, the attacker is using the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52362-critical-server-side-request-forgery-vulnerability-in-phproxy\/\"  data-wpil-monitor-id=\"71136\">vulnerable proxy handler to send a GET request<\/a> to an internal service that would otherwise be inaccessible. The server processes the request as if it were legitimate, potentially giving the attacker <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50060-critical-data-access-vulnerability-in-oracle-bi-publisher\/\"  data-wpil-monitor-id=\"70158\">access to sensitive data<\/a> or system resources.<\/p>\n<p><strong>Mitigation<\/strong><\/p>\n<p>It is strongly recommended to apply the vendor patch as soon as possible. The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-46198-cross-site-scripting-vulnerability-in-grav-versions-1-7-46-to-1-7-48\/\"  data-wpil-monitor-id=\"69870\">vulnerability is fixed in Manager-io\/Manager version<\/a> 25.7.21.2525. As a temporary mitigation, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50738-memos-application-vulnerability-allows-for-unauthorized-user-information-disclosure\/\"  data-wpil-monitor-id=\"69871\">users may also implement a Web Application<\/a> Firewall (WAF) or Intrusion Detection System (IDS) to detect and block malicious requests attempting to exploit this vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview A critical security vulnerability, tagged as CVE-2025-54122, has been identified in the Manager-io\/Manager accounting software. This vulnerability, an unauthenticated full read Server-Side Request Forgery (SSRF), affects both the Desktop and Server editions of the software. It allows attackers to bypass network isolation and access restrictions, potentially gaining access to internal services, cloud metadata endpoints, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[101],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-59709","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-ssrf"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=59709"}],"version-history":[{"count":6,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59709\/revisions"}],"predecessor-version":[{"id":63668,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59709\/revisions\/63668"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=59709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=59709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=59709"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=59709"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=59709"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=59709"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=59709"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=59709"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=59709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}