Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10273: Path Traversal in erjinzhi 10OA

0
Medium
VulnerabilityCVE-2025-10273cvecve-2025-10273
Published: Thu Sep 11 2025 (09/11/2025, 23:32:05 UTC)
Source: CVE Database V5
Vendor/Project: erjinzhi
Product: 10OA

Description

A vulnerability was identified in erjinzhi 10OA 1.0. Affected by this vulnerability is an unknown functionality of the file /view/file.aspx. Such manipulation of the argument File leads to path traversal. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/19/2025, 01:02:32 UTC

Technical Analysis

CVE-2025-10273 is a path traversal vulnerability identified in erjinzhi 10OA version 1.0, specifically affecting the /view/file.aspx endpoint. The vulnerability arises from improper validation or sanitization of the 'File' argument, allowing an attacker to manipulate the file path input and traverse directories outside the intended scope. This can enable unauthorized access to files on the server's filesystem that should otherwise be restricted. The vulnerability requires low attack complexity and only limited privileges (PR:L), with no user interaction needed. The attack vector is adjacent network (AV:A), meaning exploitation is possible from a network location adjacent to the vulnerable system, such as within the same local network or VPN. The CVSS 4.0 base score is 5.1 (medium severity), reflecting limited confidentiality impact (VC:L) and no impact on integrity or availability. No authentication bypass or privilege escalation is indicated, but the ability to read arbitrary files can expose sensitive configuration files, credentials, or other critical data. The vendor was contacted but did not respond, and no patches are currently available. Public exploits exist, increasing the risk of exploitation despite no known active exploitation in the wild at this time. The vulnerability's presence in a web-based office automation product (10OA) suggests potential exposure in enterprise environments where this software is deployed for document management or workflow automation.

Potential Impact

For European organizations using erjinzhi 10OA 1.0, this vulnerability poses a moderate risk. Successful exploitation can lead to unauthorized disclosure of sensitive internal documents, configuration files, or credentials, potentially facilitating further attacks such as privilege escalation or lateral movement. Given that the attack vector is adjacent network, internal threat actors or attackers who have gained limited network access could exploit this flaw. The lack of vendor response and absence of patches increases the window of exposure. Organizations in regulated sectors (finance, healthcare, government) could face compliance issues if sensitive data is leaked. Additionally, the exposure of internal files could undermine operational security and trust. Although the vulnerability does not directly impact system integrity or availability, the confidentiality breach can have cascading effects on organizational security posture.

Mitigation Recommendations

European organizations should immediately audit their networks to identify any deployments of erjinzhi 10OA 1.0. If found, they should isolate these systems from untrusted networks to limit adjacent network access. As no official patch is available, organizations should implement compensating controls such as web application firewalls (WAFs) with custom rules to detect and block path traversal patterns targeting /view/file.aspx. Input validation and filtering at the network perimeter or proxy level can reduce exploit attempts. Monitoring and logging access to the vulnerable endpoint should be enhanced to detect suspicious activity. If possible, consider disabling or restricting access to the vulnerable functionality until a vendor patch or workaround is provided. Organizations should also engage with erjinzhi for updates and consider alternative solutions if the vendor remains unresponsive. Regular security awareness training for internal users about lateral movement risks can further reduce exploitation likelihood.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-11T15:11:30.051Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c35eee563d4c3db0621dda

Added to database: 9/11/2025, 11:44:46 PM

Last enriched: 9/19/2025, 1:02:32 AM

Last updated: 10/30/2025, 7:16:43 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats