Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13265: Path Traversal in lsfusion platform

0
Medium
VulnerabilityCVE-2025-13265cvecve-2025-13265
Published: Mon Nov 17 2025 (11/17/2025, 05:32:05 UTC)
Source: CVE Database V5
Vendor/Project: lsfusion
Product: platform

Description

A weakness has been identified in lsfusion platform up to 6.1. This vulnerability affects the function unpackFile of the file server/src/main/java/lsfusion/server/physics/dev/integration/external/to/file/ZipUtils.java. This manipulation causes path traversal. It is possible to initiate the attack remotely.

AI-Powered Analysis

AILast updated: 11/17/2025, 05:45:49 UTC

Technical Analysis

CVE-2025-13265 identifies a path traversal vulnerability in the lsfusion platform, specifically affecting versions 6.0 and 6.1. The vulnerability resides in the unpackFile function of the ZipUtils.java file, which is responsible for extracting files from archives. Due to insufficient validation of file paths during extraction, an attacker can craft malicious archive files that include path traversal sequences (e.g., ../) to escape the intended extraction directory. This allows overwriting or creating files outside the designated directory, potentially leading to unauthorized file modification or disclosure. The vulnerability can be triggered remotely without requiring user interaction or elevated privileges, although some level of platform access is necessary. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). No known exploits have been reported in the wild, and no patches have been officially released at the time of publication. The vulnerability affects the core file handling mechanism of the lsfusion platform, which is used in enterprise environments for application development and deployment, making it a relevant concern for organizations relying on this software.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized modification or disclosure of sensitive files, potentially compromising business-critical data and application integrity. Attackers could overwrite configuration files, inject malicious code, or expose confidential information stored on the server. This could disrupt business operations, lead to data breaches, or facilitate further attacks such as privilege escalation or lateral movement within the network. The impact is particularly significant for sectors relying on lsfusion for critical applications, including finance, manufacturing, and public administration. Given the remote exploitability and lack of required user interaction, attackers could automate attacks, increasing the risk of widespread compromise. However, the medium severity and requirement for some level of access reduce the likelihood of mass exploitation without additional vulnerabilities or misconfigurations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict validation and sanitization of file paths during archive extraction to prevent path traversal sequences. Applying input validation to reject or normalize suspicious file names before unpacking is critical. Until official patches are released, consider deploying compensating controls such as running the lsfusion platform with least privilege file system permissions to limit the impact of unauthorized file writes. Employ monitoring and alerting on unexpected file system changes, especially outside designated directories. Network segmentation and access controls should restrict who can interact with the vulnerable unpackFile functionality. Regularly review and audit logs for signs of exploitation attempts. Engage with the vendor for timely patch releases and apply updates promptly once available. Additionally, consider sandboxing or containerizing the platform to isolate potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-16T15:33:22.440Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691ab4bd8eaa519f4313878d

Added to database: 11/17/2025, 5:38:05 AM

Last enriched: 11/17/2025, 5:45:49 AM

Last updated: 11/17/2025, 7:23:02 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats