Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SEG) in SEG prior to 2.32 running on Windows and SEG prior to 2503 running on UAG allows routing of network traffic such as HTTP requests to internal networks.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.omnissa.com/omsa-2025-0003/ |
![]() ![]() |
History
Tue, 12 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 12 Aug 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Omnissa
Omnissa secure Email Gateway |
|
Vendors & Products |
Omnissa
Omnissa secure Email Gateway |
Mon, 11 Aug 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SEG) in SEG prior to 2.32 running on Windows and SEG prior to 2503 running on UAG allows routing of network traffic such as HTTP requests to internal networks. | |
Title | Omnissa Secure Email Gateway (SEG) updates address Server-Side Request Forgery (SSRF) vulnerability | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Omnissa
Published: 2025-08-11T21:47:25.510Z
Updated: 2025-08-12T15:45:31.666Z
Reserved: 2025-02-04T20:59:07.334Z
Link: CVE-2025-25235

Updated: 2025-08-12T15:45:26.965Z

Status : Awaiting Analysis
Published: 2025-08-11T22:15:26.693
Modified: 2025-08-12T14:25:33.177
Link: CVE-2025-25235

No data.