Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13200: Exposure of Information Through Directory Listing in SourceCodester Farm Management System

0
Medium
VulnerabilityCVE-2025-13200cvecve-2025-13200
Published: Sat Nov 15 2025 (11/15/2025, 15:32:05 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Farm Management System

Description

A vulnerability was determined in SourceCodester Farm Management System 1.0. Affected by this vulnerability is an unknown functionality. This manipulation causes exposure of information through directory listing. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 11/15/2025, 16:00:16 UTC

Technical Analysis

CVE-2025-13200 identifies a vulnerability in SourceCodester Farm Management System version 1.0 where directory listing is enabled or improperly configured, allowing remote attackers to enumerate files and directories on the web server hosting the application. This exposure can reveal sensitive files such as configuration files, source code, backup files, or other data that should remain confidential. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, making it accessible to any attacker scanning for vulnerable instances. The CVSS 4.0 base score of 6.9 reflects a medium severity, primarily due to the confidentiality impact from information disclosure, with no impact on integrity or availability. The vulnerability does not require privileges or user interaction, increasing its exploitability. Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the risk of exploitation by opportunistic attackers. The lack of vendor patches at the time of disclosure means organizations must rely on configuration changes such as disabling directory listing in the web server or restricting access to sensitive directories. This vulnerability is particularly relevant to organizations in the agricultural sector using this specific farm management software, as exposed information could facilitate further targeted attacks or data breaches.

Potential Impact

For European organizations, especially those in the agricultural sector using SourceCodester Farm Management System 1.0, this vulnerability poses a risk of unauthorized information disclosure. Exposure of directory listings can reveal sensitive operational data, configuration details, or source code, which attackers can leverage to identify further vulnerabilities or gain unauthorized access. This can lead to compromised confidentiality of business-critical information, potential intellectual property theft, and increased risk of subsequent attacks such as privilege escalation or ransomware. While the vulnerability does not directly affect system integrity or availability, the information gained can facilitate more damaging attacks. Given the importance of agriculture in many European economies and the increasing digitization of farm management, exploitation could disrupt supply chains or damage organizational reputation. The medium severity rating suggests a moderate but non-negligible risk that should be addressed promptly to prevent exploitation.

Mitigation Recommendations

1. Immediately disable directory listing on the web server hosting the SourceCodester Farm Management System by configuring the server settings (e.g., disabling 'Options Indexes' in Apache or 'directoryBrowse' in IIS). 2. Restrict access to sensitive directories and files using access control mechanisms such as .htaccess files or web server access rules. 3. Monitor web server logs for unusual directory access attempts to detect potential reconnaissance activity. 4. Apply any vendor-provided patches or updates as soon as they become available. 5. Conduct a security audit of the farm management system deployment to identify and remediate other potential misconfigurations. 6. Implement network segmentation to isolate the farm management system from critical internal networks to limit lateral movement if compromised. 7. Educate system administrators about secure web server configurations and the risks of directory listing exposure. 8. Consider deploying web application firewalls (WAF) to detect and block suspicious requests targeting directory enumeration.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T16:18:58.263Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6918a1f63494992e767dd3d0

Added to database: 11/15/2025, 3:53:26 PM

Last enriched: 11/15/2025, 4:00:16 PM

Last updated: 11/16/2025, 4:10:51 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats