Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13261: Path Traversal in lsfusion platform

0
Medium
VulnerabilityCVE-2025-13261cvecve-2025-13261
Published: Mon Nov 17 2025 (11/17/2025, 03:32:05 UTC)
Source: CVE Database V5
Vendor/Project: lsfusion
Product: platform

Description

A vulnerability was found in lsfusion platform up to 6.1. Affected is the function DownloadFileRequestHandler of the file web-client/src/main/java/lsfusion/http/controller/file/DownloadFileRequestHandler.java. Performing manipulation of the argument Version results in path traversal. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 11/24/2025, 04:51:23 UTC

Technical Analysis

CVE-2025-13261 is a path traversal vulnerability identified in the lsfusion platform, specifically affecting versions 6.0 and 6.1. The flaw resides in the DownloadFileRequestHandler component, located in the source file web-client/src/main/java/lsfusion/http/controller/file/DownloadFileRequestHandler.java. The vulnerability arises from improper validation of the 'Version' parameter, which an attacker can manipulate to perform directory traversal attacks. By crafting malicious requests that alter this parameter, an attacker can escape the intended file directory boundaries and access arbitrary files on the server. This can lead to unauthorized disclosure of sensitive information stored on the system. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation and potential impact on confidentiality. Although no active exploitation has been reported, a public exploit is available, which could facilitate attacks. The vulnerability does not affect integrity or availability directly but poses a significant confidentiality risk. No official patches have been linked yet, so organizations must implement compensating controls to mitigate the threat.

Potential Impact

For European organizations, the primary impact of CVE-2025-13261 is the potential unauthorized disclosure of sensitive or confidential files hosted on lsfusion platform servers. This could include intellectual property, personal data protected under GDPR, or internal configuration files that could further aid attackers. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in sectors where lsfusion is used for critical business applications. Data breaches resulting from this vulnerability could lead to regulatory penalties, reputational damage, and operational disruptions. Organizations in finance, healthcare, government, and manufacturing sectors using lsfusion may face heightened risks due to the sensitivity of their data. The availability of a public exploit increases the likelihood of opportunistic attacks, making timely mitigation essential to reduce exposure.

Mitigation Recommendations

1. Immediately audit and restrict access to the DownloadFileRequestHandler functionality, especially the 'Version' parameter, to ensure it does not accept directory traversal sequences such as '../'. 2. Implement strict input validation and sanitization on all file path parameters to enforce allowed file path patterns and prevent traversal. 3. Employ application-level whitelisting to restrict file downloads to a predefined safe directory or set of files. 4. Monitor web server and application logs for unusual file access patterns or attempts to exploit path traversal. 5. If possible, isolate the lsfusion platform in a segmented network zone with limited access to sensitive file systems. 6. Engage with the vendor or community to obtain and apply official patches or updates once available. 7. Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block path traversal attempts targeting the 'Version' parameter. 8. Conduct regular security assessments and penetration tests focusing on file handling components to detect similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-16T10:59:50.911Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691a9d62c118c0da2e5d7e99

Added to database: 11/17/2025, 3:58:26 AM

Last enriched: 11/24/2025, 4:51:23 AM

Last updated: 1/7/2026, 5:23:46 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats