CVE-2024-8163: Path Traversal in Chengdu Everbrite Network Technology BeikeShop
A vulnerability was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this issue is the function destroyFiles of the file /admin/file_manager/files. The manipulation of the argument files results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 1.6.0 can resolve this issue. You should upgrade the affected component.
AI Analysis
Technical Summary
CVE-2024-8163 is a path traversal vulnerability identified in the BeikeShop e-commerce platform developed by Chengdu Everbrite Network Technology. The vulnerability exists in the destroyFiles function located at /admin/file_manager/files, where the input parameter 'files' is insufficiently sanitized, allowing attackers to manipulate the file path. This manipulation enables traversal outside the intended directory, potentially leading to unauthorized deletion or access of arbitrary files on the server. The vulnerability is remotely exploitable without user interaction and requires only low privileges, making it accessible to authenticated users with limited rights. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability, with ease of exploitation and no user interaction needed. The vendor has addressed this issue in version 1.6.0, and upgrading is the recommended remediation. While no known exploits in the wild have been reported, the public availability of exploit code increases the likelihood of attacks. Organizations running affected versions should assess their exposure and apply patches promptly to mitigate risks associated with unauthorized file system access, which could lead to data breaches or service interruptions.
Potential Impact
For European organizations using BeikeShop versions 1.5.0 through 1.5.5, this vulnerability poses a risk of unauthorized file deletion or access, potentially leading to data loss, service disruption, or exposure of sensitive information. Attackers exploiting this flaw could compromise the integrity and availability of the e-commerce platform, affecting business operations and customer trust. Given the remote exploitability and lack of user interaction required, attackers could automate attacks at scale. This is particularly concerning for organizations handling sensitive customer data or critical business functions via BeikeShop. The impact could extend to regulatory compliance issues under GDPR if personal data is exposed or lost. Additionally, disruption of e-commerce services could result in financial losses and reputational damage. The medium severity rating suggests a moderate but actionable threat that should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediately upgrade BeikeShop installations to version 1.6.0 or later, where the vulnerability is patched. 2. Restrict access to the /admin/file_manager/files endpoint to trusted administrators only, using network segmentation and access control lists. 3. Implement web application firewall (WAF) rules to detect and block path traversal patterns targeting the 'files' parameter. 4. Conduct regular security audits and code reviews of custom plugins or modifications to BeikeShop to ensure no similar vulnerabilities exist. 5. Monitor server logs for suspicious file access or deletion activities, especially unusual requests to the file manager. 6. Employ principle of least privilege for user accounts to limit the impact of compromised credentials. 7. Backup critical data regularly to enable recovery in case of file deletion or corruption. 8. Educate administrators on the risks of path traversal vulnerabilities and the importance of timely patching.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-8163: Path Traversal in Chengdu Everbrite Network Technology BeikeShop
Description
A vulnerability was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this issue is the function destroyFiles of the file /admin/file_manager/files. The manipulation of the argument files results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 1.6.0 can resolve this issue. You should upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2024-8163 is a path traversal vulnerability identified in the BeikeShop e-commerce platform developed by Chengdu Everbrite Network Technology. The vulnerability exists in the destroyFiles function located at /admin/file_manager/files, where the input parameter 'files' is insufficiently sanitized, allowing attackers to manipulate the file path. This manipulation enables traversal outside the intended directory, potentially leading to unauthorized deletion or access of arbitrary files on the server. The vulnerability is remotely exploitable without user interaction and requires only low privileges, making it accessible to authenticated users with limited rights. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability, with ease of exploitation and no user interaction needed. The vendor has addressed this issue in version 1.6.0, and upgrading is the recommended remediation. While no known exploits in the wild have been reported, the public availability of exploit code increases the likelihood of attacks. Organizations running affected versions should assess their exposure and apply patches promptly to mitigate risks associated with unauthorized file system access, which could lead to data breaches or service interruptions.
Potential Impact
For European organizations using BeikeShop versions 1.5.0 through 1.5.5, this vulnerability poses a risk of unauthorized file deletion or access, potentially leading to data loss, service disruption, or exposure of sensitive information. Attackers exploiting this flaw could compromise the integrity and availability of the e-commerce platform, affecting business operations and customer trust. Given the remote exploitability and lack of user interaction required, attackers could automate attacks at scale. This is particularly concerning for organizations handling sensitive customer data or critical business functions via BeikeShop. The impact could extend to regulatory compliance issues under GDPR if personal data is exposed or lost. Additionally, disruption of e-commerce services could result in financial losses and reputational damage. The medium severity rating suggests a moderate but actionable threat that should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediately upgrade BeikeShop installations to version 1.6.0 or later, where the vulnerability is patched. 2. Restrict access to the /admin/file_manager/files endpoint to trusted administrators only, using network segmentation and access control lists. 3. Implement web application firewall (WAF) rules to detect and block path traversal patterns targeting the 'files' parameter. 4. Conduct regular security audits and code reviews of custom plugins or modifications to BeikeShop to ensure no similar vulnerabilities exist. 5. Monitor server logs for suspicious file access or deletion activities, especially unusual requests to the file manager. 6. Employ principle of least privilege for user accounts to limit the impact of compromised credentials. 7. Backup critical data regularly to enable recovery in case of file deletion or corruption. 8. Educate administrators on the risks of path traversal vulnerabilities and the importance of timely patching.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-08-26T07:22:14.393Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6923fb9b011871acbdf22a2a
Added to database: 11/24/2025, 6:30:51 AM
Last enriched: 11/24/2025, 6:46:25 AM
Last updated: 11/24/2025, 9:09:46 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13596: CWE-209 Generation of Error Message Containing Sensitive Information in ATISoluciones CIGES
LowCVE-2025-13588: Server-Side Request Forgery in lKinderBueno Streamity Xtream IPTV Player
MediumCVE-2024-8165: Path Traversal in Chengdu Everbrite Network Technology BeikeShop
MediumCVE-2024-8164: Unrestricted Upload in Chengdu Everbrite Network Technology BeikeShop
MediumCVE-2025-13586: SQL Injection in SourceCodester Online Student Clearance System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.