ONLYOFFICE all versions as of 2021-11-08 is vulnerable to Server-Side Request Forgery (SSRF). The document editor service can be abused to read and serve arbitrary URLs as a document.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/ONLYOFFICE/server | Third Party Advisory | 
| https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ | Exploit Mitigation Third Party Advisory | 
| https://www.onlyoffice.com/ | Product Vendor Advisory | 
| https://github.com/ONLYOFFICE/server | Third Party Advisory | 
| https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ | Exploit Mitigation Third Party Advisory | 
| https://www.onlyoffice.com/ | Product Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 06:29
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-01-23 15:15
Updated : 2025-04-02 16:15
NVD link : CVE-2021-43449
Mitre link : CVE-2021-43449
CVE.ORG link : CVE-2021-43449
JSON object : View
Products Affected
                onlyoffice
- server
CWE
                
                    
                        
                        CWE-918
                        
            Server-Side Request Forgery (SSRF)
