Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13200: Exposure of Information Through Directory Listing in SourceCodester Farm Management System

0
Medium
VulnerabilityCVE-2025-13200cvecve-2025-13200
Published: Sat Nov 15 2025 (11/15/2025, 15:32:05 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Farm Management System

Description

A vulnerability was determined in SourceCodester Farm Management System 1.0. Affected by this vulnerability is an unknown functionality. This manipulation causes exposure of information through directory listing. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 11/22/2025, 16:23:20 UTC

Technical Analysis

CVE-2025-13200 is a vulnerability identified in SourceCodester Farm Management System version 1.0 that results in exposure of information through directory listing. Directory listing occurs when a web server is configured to allow users to view the contents of directories without an index file, revealing files and folders that should remain hidden. This vulnerability is remotely exploitable without requiring authentication or user interaction, making it accessible to any attacker with network access to the affected system. The exposed directories may contain sensitive files such as configuration files, source code, or data files that could provide attackers with valuable information to facilitate further attacks, including privilege escalation or data exfiltration. The CVSS 4.0 score of 6.9 (medium severity) reflects the vulnerability's moderate impact on confidentiality with no impact on integrity or availability. The vulnerability has been publicly disclosed but no known exploits are currently active in the wild. The lack of vendor patches at the time of disclosure means organizations must rely on configuration changes to mitigate risk. This vulnerability highlights the importance of secure web server configuration and access control in protecting sensitive agricultural management systems.

Potential Impact

For European organizations, especially those in the agricultural sector using SourceCodester Farm Management System 1.0, this vulnerability poses a risk of unauthorized disclosure of sensitive operational data. Exposure of directory contents can reveal critical information such as database credentials, system configurations, or proprietary data, which attackers can leverage to conduct further intrusions or disrupt operations. Confidentiality breaches could lead to loss of competitive advantage, regulatory non-compliance (e.g., GDPR if personal data is exposed), and reputational damage. Although the vulnerability does not directly impact system integrity or availability, the information gained could facilitate more severe attacks. Given the increasing digitization of agriculture in Europe, including precision farming and supply chain management, the impact could extend to critical infrastructure sectors. The medium severity rating suggests a moderate but actionable threat that requires timely mitigation to prevent exploitation.

Mitigation Recommendations

1. Immediately disable directory listing on all web servers hosting the SourceCodester Farm Management System by configuring the web server settings (e.g., disabling 'Options Indexes' in Apache or 'directory browsing' in IIS). 2. Restrict access to the Farm Management System interfaces using network-level controls such as firewalls or VPNs to limit exposure to trusted users only. 3. Monitor web server logs for unusual directory access attempts that may indicate reconnaissance activity. 4. Implement strict file and directory permissions to ensure sensitive files are not accessible via the web server. 5. Regularly audit the web server configuration and application deployment to ensure no inadvertent exposure of directories or files. 6. Engage with the vendor or SourceCodester community to obtain and apply patches or updates addressing this vulnerability once available. 7. Educate system administrators about secure web server configurations and the risks of directory listing. 8. Consider deploying web application firewalls (WAFs) to detect and block attempts to exploit directory listing vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T16:18:58.263Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6918a1f63494992e767dd3d0

Added to database: 11/15/2025, 3:53:26 PM

Last enriched: 11/22/2025, 4:23:20 PM

Last updated: 1/7/2026, 8:55:21 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats