CVE-2025-14520: Path Traversal in baowzh hfly
A weakness has been identified in baowzh hfly up to 638ff9abe9078bc977c132b37acbe1900b63491c. Impacted is an unknown function of the file /admin/index.php/datafile/delfile. This manipulation of the argument filename causes path traversal. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. This product adopts a rolling release strategy to maintain continuous delivery The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14520 is a path traversal vulnerability identified in the baowzh hfly product up to commit 638ff9abe9078bc977c132b37acbe1900b63491c. The vulnerability exists in an unspecified function handling the /admin/index.php/datafile/delfile endpoint, where the filename argument is insufficiently sanitized. This allows an attacker to craft a filename parameter that traverses directories (e.g., using ../ sequences) to access or delete files outside the intended directory scope. The vulnerability can be exploited remotely without user interaction but requires low privileges (PR:L), indicating that the attacker must have some authenticated access, albeit minimal. The CVSS 4.0 score is 5.3 (medium), reflecting network attack vector, low complexity, no user interaction, and limited impact on confidentiality, integrity, and availability. The vendor follows a rolling release strategy but has not responded to the vulnerability disclosure, and no patches or mitigations have been published. Public exploit code is available, increasing the risk of exploitation despite no current reports of active attacks. The vulnerability could allow attackers to read or delete sensitive files, potentially leading to information disclosure or disruption of service. Organizations using baowzh hfly should assess exposure and implement compensating controls promptly.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity. Attackers with low-level access could exploit the path traversal to access sensitive configuration files, user data, or system files, potentially leading to data breaches or unauthorized data manipulation. Deletion of critical files could disrupt application availability or functionality. The lack of vendor response and patches increases the window of exposure. Organizations in sectors such as government, finance, healthcare, or critical infrastructure using baowzh hfly may face increased risk due to the sensitivity of their data and regulatory requirements like GDPR. Exploitation could result in compliance violations, reputational damage, and operational disruptions. The public availability of exploit code lowers the barrier for attackers, necessitating urgent mitigation. However, the requirement for low privileges limits exploitation to insiders or attackers who have already compromised user credentials or accounts with limited access.
Mitigation Recommendations
1. Restrict access to the /admin/index.php/datafile/delfile endpoint to trusted administrators only, using network segmentation, IP whitelisting, or VPNs. 2. Implement strict input validation and sanitization on the filename parameter to reject any path traversal sequences such as '../'. 3. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting this endpoint. 4. Monitor logs for unusual file access or deletion activities, especially around the vulnerable endpoint. 5. Enforce the principle of least privilege for user accounts to minimize the impact of compromised credentials. 6. If possible, isolate the application environment to limit file system access and prevent unauthorized file operations. 7. Engage with the vendor or community to track any forthcoming patches or updates and apply them promptly. 8. Consider alternative software solutions if the vendor remains unresponsive and the risk is unacceptable. 9. Conduct regular security audits and penetration tests focusing on file handling functionalities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-14520: Path Traversal in baowzh hfly
Description
A weakness has been identified in baowzh hfly up to 638ff9abe9078bc977c132b37acbe1900b63491c. Impacted is an unknown function of the file /admin/index.php/datafile/delfile. This manipulation of the argument filename causes path traversal. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. This product adopts a rolling release strategy to maintain continuous delivery The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14520 is a path traversal vulnerability identified in the baowzh hfly product up to commit 638ff9abe9078bc977c132b37acbe1900b63491c. The vulnerability exists in an unspecified function handling the /admin/index.php/datafile/delfile endpoint, where the filename argument is insufficiently sanitized. This allows an attacker to craft a filename parameter that traverses directories (e.g., using ../ sequences) to access or delete files outside the intended directory scope. The vulnerability can be exploited remotely without user interaction but requires low privileges (PR:L), indicating that the attacker must have some authenticated access, albeit minimal. The CVSS 4.0 score is 5.3 (medium), reflecting network attack vector, low complexity, no user interaction, and limited impact on confidentiality, integrity, and availability. The vendor follows a rolling release strategy but has not responded to the vulnerability disclosure, and no patches or mitigations have been published. Public exploit code is available, increasing the risk of exploitation despite no current reports of active attacks. The vulnerability could allow attackers to read or delete sensitive files, potentially leading to information disclosure or disruption of service. Organizations using baowzh hfly should assess exposure and implement compensating controls promptly.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity. Attackers with low-level access could exploit the path traversal to access sensitive configuration files, user data, or system files, potentially leading to data breaches or unauthorized data manipulation. Deletion of critical files could disrupt application availability or functionality. The lack of vendor response and patches increases the window of exposure. Organizations in sectors such as government, finance, healthcare, or critical infrastructure using baowzh hfly may face increased risk due to the sensitivity of their data and regulatory requirements like GDPR. Exploitation could result in compliance violations, reputational damage, and operational disruptions. The public availability of exploit code lowers the barrier for attackers, necessitating urgent mitigation. However, the requirement for low privileges limits exploitation to insiders or attackers who have already compromised user credentials or accounts with limited access.
Mitigation Recommendations
1. Restrict access to the /admin/index.php/datafile/delfile endpoint to trusted administrators only, using network segmentation, IP whitelisting, or VPNs. 2. Implement strict input validation and sanitization on the filename parameter to reject any path traversal sequences such as '../'. 3. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting this endpoint. 4. Monitor logs for unusual file access or deletion activities, especially around the vulnerable endpoint. 5. Enforce the principle of least privilege for user accounts to minimize the impact of compromised credentials. 6. If possible, isolate the application environment to limit file system access and prevent unauthorized file operations. 7. Engage with the vendor or community to track any forthcoming patches or updates and apply them promptly. 8. Consider alternative software solutions if the vendor remains unresponsive and the risk is unacceptable. 9. Conduct regular security audits and penetration tests focusing on file handling functionalities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-11T07:00:40.587Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693ae5917d4c6f31f7b66fe5
Added to database: 12/11/2025, 3:38:57 PM
Last enriched: 12/11/2025, 3:55:42 PM
Last updated: 12/12/2025, 3:13:08 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13670: CWE-427 Uncontrolled Search Path Element in Altera High Level Synthesis Compiler
MediumCVE-2025-13669: CWE-427 Uncontrolled Search Path Element in Altera High Level Synthesis Compiler
MediumCVE-2025-13053: CWE-311 Missing Encryption of Sensitive Data in ASUSTOR ADM
HighCVE-2025-13052: CWE-295 Improper Certificate Validation in ASUSTOR ADM
HighCVE-2025-13886: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in cvedovini LT Unleashed
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.