CVE-2025-13261: Path Traversal in lsfusion platform
A vulnerability was found in lsfusion platform up to 6.1. Affected is the function DownloadFileRequestHandler of the file web-client/src/main/java/lsfusion/http/controller/file/DownloadFileRequestHandler.java. Performing manipulation of the argument Version results in path traversal. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-13261 is a path traversal vulnerability identified in the lsfusion platform, specifically affecting versions 6.0 and 6.1. The flaw resides in the DownloadFileRequestHandler component, located in the source file web-client/src/main/java/lsfusion/http/controller/file/DownloadFileRequestHandler.java. The vulnerability arises from improper validation of the 'Version' parameter, which an attacker can manipulate to perform directory traversal attacks. By crafting malicious requests that alter this parameter, an attacker can escape the intended file directory boundaries and access arbitrary files on the server. This can lead to unauthorized disclosure of sensitive information stored on the system. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation and potential impact on confidentiality. Although no active exploitation has been reported, a public exploit is available, which could facilitate attacks. The vulnerability does not affect integrity or availability directly but poses a significant confidentiality risk. No official patches have been linked yet, so organizations must implement compensating controls to mitigate the threat.
Potential Impact
For European organizations, the primary impact of CVE-2025-13261 is the potential unauthorized disclosure of sensitive or confidential files hosted on lsfusion platform servers. This could include intellectual property, personal data protected under GDPR, or internal configuration files that could further aid attackers. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in sectors where lsfusion is used for critical business applications. Data breaches resulting from this vulnerability could lead to regulatory penalties, reputational damage, and operational disruptions. Organizations in finance, healthcare, government, and manufacturing sectors using lsfusion may face heightened risks due to the sensitivity of their data. The availability of a public exploit increases the likelihood of opportunistic attacks, making timely mitigation essential to reduce exposure.
Mitigation Recommendations
1. Immediately audit and restrict access to the DownloadFileRequestHandler functionality, especially the 'Version' parameter, to ensure it does not accept directory traversal sequences such as '../'. 2. Implement strict input validation and sanitization on all file path parameters to enforce allowed file path patterns and prevent traversal. 3. Employ application-level whitelisting to restrict file downloads to a predefined safe directory or set of files. 4. Monitor web server and application logs for unusual file access patterns or attempts to exploit path traversal. 5. If possible, isolate the lsfusion platform in a segmented network zone with limited access to sensitive file systems. 6. Engage with the vendor or community to obtain and apply official patches or updates once available. 7. Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block path traversal attempts targeting the 'Version' parameter. 8. Conduct regular security assessments and penetration tests focusing on file handling components to detect similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13261: Path Traversal in lsfusion platform
Description
A vulnerability was found in lsfusion platform up to 6.1. Affected is the function DownloadFileRequestHandler of the file web-client/src/main/java/lsfusion/http/controller/file/DownloadFileRequestHandler.java. Performing manipulation of the argument Version results in path traversal. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13261 is a path traversal vulnerability identified in the lsfusion platform, specifically affecting versions 6.0 and 6.1. The flaw resides in the DownloadFileRequestHandler component, located in the source file web-client/src/main/java/lsfusion/http/controller/file/DownloadFileRequestHandler.java. The vulnerability arises from improper validation of the 'Version' parameter, which an attacker can manipulate to perform directory traversal attacks. By crafting malicious requests that alter this parameter, an attacker can escape the intended file directory boundaries and access arbitrary files on the server. This can lead to unauthorized disclosure of sensitive information stored on the system. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation and potential impact on confidentiality. Although no active exploitation has been reported, a public exploit is available, which could facilitate attacks. The vulnerability does not affect integrity or availability directly but poses a significant confidentiality risk. No official patches have been linked yet, so organizations must implement compensating controls to mitigate the threat.
Potential Impact
For European organizations, the primary impact of CVE-2025-13261 is the potential unauthorized disclosure of sensitive or confidential files hosted on lsfusion platform servers. This could include intellectual property, personal data protected under GDPR, or internal configuration files that could further aid attackers. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in sectors where lsfusion is used for critical business applications. Data breaches resulting from this vulnerability could lead to regulatory penalties, reputational damage, and operational disruptions. Organizations in finance, healthcare, government, and manufacturing sectors using lsfusion may face heightened risks due to the sensitivity of their data. The availability of a public exploit increases the likelihood of opportunistic attacks, making timely mitigation essential to reduce exposure.
Mitigation Recommendations
1. Immediately audit and restrict access to the DownloadFileRequestHandler functionality, especially the 'Version' parameter, to ensure it does not accept directory traversal sequences such as '../'. 2. Implement strict input validation and sanitization on all file path parameters to enforce allowed file path patterns and prevent traversal. 3. Employ application-level whitelisting to restrict file downloads to a predefined safe directory or set of files. 4. Monitor web server and application logs for unusual file access patterns or attempts to exploit path traversal. 5. If possible, isolate the lsfusion platform in a segmented network zone with limited access to sensitive file systems. 6. Engage with the vendor or community to obtain and apply official patches or updates once available. 7. Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block path traversal attempts targeting the 'Version' parameter. 8. Conduct regular security assessments and penetration tests focusing on file handling components to detect similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-16T10:59:50.911Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691a9d62c118c0da2e5d7e99
Added to database: 11/17/2025, 3:58:26 AM
Last enriched: 11/24/2025, 4:51:23 AM
Last updated: 1/7/2026, 5:23:46 AM
Views: 74
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.