CVE-2025-13200: Exposure of Information Through Directory Listing in SourceCodester Farm Management System
A vulnerability was determined in SourceCodester Farm Management System 1.0. Affected by this vulnerability is an unknown functionality. This manipulation causes exposure of information through directory listing. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-13200 is a vulnerability identified in SourceCodester Farm Management System version 1.0 that results in exposure of information through directory listing. Directory listing occurs when a web server is configured to allow users to view the contents of directories without an index file, revealing files and folders that should remain hidden. This vulnerability is remotely exploitable without requiring authentication or user interaction, making it accessible to any attacker with network access to the affected system. The exposed directories may contain sensitive files such as configuration files, source code, or data files that could provide attackers with valuable information to facilitate further attacks, including privilege escalation or data exfiltration. The CVSS 4.0 score of 6.9 (medium severity) reflects the vulnerability's moderate impact on confidentiality with no impact on integrity or availability. The vulnerability has been publicly disclosed but no known exploits are currently active in the wild. The lack of vendor patches at the time of disclosure means organizations must rely on configuration changes to mitigate risk. This vulnerability highlights the importance of secure web server configuration and access control in protecting sensitive agricultural management systems.
Potential Impact
For European organizations, especially those in the agricultural sector using SourceCodester Farm Management System 1.0, this vulnerability poses a risk of unauthorized disclosure of sensitive operational data. Exposure of directory contents can reveal critical information such as database credentials, system configurations, or proprietary data, which attackers can leverage to conduct further intrusions or disrupt operations. Confidentiality breaches could lead to loss of competitive advantage, regulatory non-compliance (e.g., GDPR if personal data is exposed), and reputational damage. Although the vulnerability does not directly impact system integrity or availability, the information gained could facilitate more severe attacks. Given the increasing digitization of agriculture in Europe, including precision farming and supply chain management, the impact could extend to critical infrastructure sectors. The medium severity rating suggests a moderate but actionable threat that requires timely mitigation to prevent exploitation.
Mitigation Recommendations
1. Immediately disable directory listing on all web servers hosting the SourceCodester Farm Management System by configuring the web server settings (e.g., disabling 'Options Indexes' in Apache or 'directory browsing' in IIS). 2. Restrict access to the Farm Management System interfaces using network-level controls such as firewalls or VPNs to limit exposure to trusted users only. 3. Monitor web server logs for unusual directory access attempts that may indicate reconnaissance activity. 4. Implement strict file and directory permissions to ensure sensitive files are not accessible via the web server. 5. Regularly audit the web server configuration and application deployment to ensure no inadvertent exposure of directories or files. 6. Engage with the vendor or SourceCodester community to obtain and apply patches or updates addressing this vulnerability once available. 7. Educate system administrators about secure web server configurations and the risks of directory listing. 8. Consider deploying web application firewalls (WAFs) to detect and block attempts to exploit directory listing vulnerabilities.
Affected Countries
Germany, France, Netherlands, Italy, Spain, Poland
CVE-2025-13200: Exposure of Information Through Directory Listing in SourceCodester Farm Management System
Description
A vulnerability was determined in SourceCodester Farm Management System 1.0. Affected by this vulnerability is an unknown functionality. This manipulation causes exposure of information through directory listing. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-13200 is a vulnerability identified in SourceCodester Farm Management System version 1.0 that results in exposure of information through directory listing. Directory listing occurs when a web server is configured to allow users to view the contents of directories without an index file, revealing files and folders that should remain hidden. This vulnerability is remotely exploitable without requiring authentication or user interaction, making it accessible to any attacker with network access to the affected system. The exposed directories may contain sensitive files such as configuration files, source code, or data files that could provide attackers with valuable information to facilitate further attacks, including privilege escalation or data exfiltration. The CVSS 4.0 score of 6.9 (medium severity) reflects the vulnerability's moderate impact on confidentiality with no impact on integrity or availability. The vulnerability has been publicly disclosed but no known exploits are currently active in the wild. The lack of vendor patches at the time of disclosure means organizations must rely on configuration changes to mitigate risk. This vulnerability highlights the importance of secure web server configuration and access control in protecting sensitive agricultural management systems.
Potential Impact
For European organizations, especially those in the agricultural sector using SourceCodester Farm Management System 1.0, this vulnerability poses a risk of unauthorized disclosure of sensitive operational data. Exposure of directory contents can reveal critical information such as database credentials, system configurations, or proprietary data, which attackers can leverage to conduct further intrusions or disrupt operations. Confidentiality breaches could lead to loss of competitive advantage, regulatory non-compliance (e.g., GDPR if personal data is exposed), and reputational damage. Although the vulnerability does not directly impact system integrity or availability, the information gained could facilitate more severe attacks. Given the increasing digitization of agriculture in Europe, including precision farming and supply chain management, the impact could extend to critical infrastructure sectors. The medium severity rating suggests a moderate but actionable threat that requires timely mitigation to prevent exploitation.
Mitigation Recommendations
1. Immediately disable directory listing on all web servers hosting the SourceCodester Farm Management System by configuring the web server settings (e.g., disabling 'Options Indexes' in Apache or 'directory browsing' in IIS). 2. Restrict access to the Farm Management System interfaces using network-level controls such as firewalls or VPNs to limit exposure to trusted users only. 3. Monitor web server logs for unusual directory access attempts that may indicate reconnaissance activity. 4. Implement strict file and directory permissions to ensure sensitive files are not accessible via the web server. 5. Regularly audit the web server configuration and application deployment to ensure no inadvertent exposure of directories or files. 6. Engage with the vendor or SourceCodester community to obtain and apply patches or updates addressing this vulnerability once available. 7. Educate system administrators about secure web server configurations and the risks of directory listing. 8. Consider deploying web application firewalls (WAFs) to detect and block attempts to exploit directory listing vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T16:18:58.263Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6918a1f63494992e767dd3d0
Added to database: 11/15/2025, 3:53:26 PM
Last enriched: 11/22/2025, 4:23:20 PM
Last updated: 1/7/2026, 8:55:21 AM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.