CVE-2025-64180
Manager-io/Manager · Manager-io/Manager Desktop and Server
A critical vulnerability exists in Manager.io's Manager accounting software that allows an unauthenticated attacker to gain unauthorized access to internal network resources.
Executive summary
A critical vulnerability exists in Manager.io's Manager accounting software that allows an unauthenticated attacker to gain unauthorized access to internal network resources. Successful exploitation of this flaw could lead to significant data breaches, lateral movement within the network, and compromise of other sensitive internal systems.
Vulnerability
The vulnerability is a Server-Side Request Forgery (SSRF) flaw within the Manager software. The application fails to properly validate user-supplied input that is used to make server-side web requests. An unauthenticated remote attacker can craft a malicious request, forcing the Manager server to send requests to arbitrary internal IP addresses and ports on its local network. This allows the attacker to scan the internal network, interact with internal services that are not exposed to the internet, and potentially exfiltrate sensitive data from those services.
Business impact
Business Impact: This vulnerability is rated as critical severity with a CVSS score of 10.0, representing the highest possible risk. A successful exploit could have a devastating impact on the organization. An attacker could pivot from the public-facing application to the internal corporate network, bypassing perimeter security controls. This could lead to the theft of sensitive financial data, customer information, and intellectual property stored on internal servers. Furthermore, the attacker could leverage this access to move laterally, compromise additional systems, and potentially establish a persistent foothold for long-term espionage or a ransomware attack.
Remediation
Immediate Action: Immediately update all instances of Manager Desktop and Server to a version higher than 25.11.1.3085, as per the vendor's guidance. After patching, review application and network access logs for any signs of compromise or exploitation attempts that may have occurred prior to the update.
Proactive Monitoring: Monitor application logs for requests that contain internal or loopback IP addresses (e.g., 127.0.0.1, 10.x.x.x, 192.168.x.x). Implement network traffic monitoring to detect and alert on unusual outbound connections originating from the Manager server to other internal systems, especially those hosting sensitive data or administrative services.
Compensating Controls: If patching cannot be immediately deployed, implement a Web Application Firewall (WAF) with rules specifically designed to detect and block SSRF attack patterns. Additionally, apply strict network egress filtering rules on the host running the Manager software, restricting its ability to initiate connections to other internal network segments except where explicitly required for business operations.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 10.0 and the potential for complete internal network compromise, this vulnerability requires immediate attention. We strongly recommend that all affected versions of Manager software be patched without delay. Although there is no evidence of active exploitation at this time, the high severity makes this an attractive target for attackers. Organizations should prioritize this update and implement the recommended compensating controls and monitoring to mitigate risk until patching is complete.