Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14520: Path Traversal in baowzh hfly

0
Medium
VulnerabilityCVE-2025-14520cvecve-2025-14520
Published: Thu Dec 11 2025 (12/11/2025, 15:32:10 UTC)
Source: CVE Database V5
Vendor/Project: baowzh
Product: hfly

Description

A weakness has been identified in baowzh hfly up to 638ff9abe9078bc977c132b37acbe1900b63491c. Impacted is an unknown function of the file /admin/index.php/datafile/delfile. This manipulation of the argument filename causes path traversal. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. This product adopts a rolling release strategy to maintain continuous delivery The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/11/2025, 15:55:42 UTC

Technical Analysis

CVE-2025-14520 is a path traversal vulnerability identified in the baowzh hfly product up to commit 638ff9abe9078bc977c132b37acbe1900b63491c. The vulnerability exists in an unspecified function handling the /admin/index.php/datafile/delfile endpoint, where the filename argument is insufficiently sanitized. This allows an attacker to craft a filename parameter that traverses directories (e.g., using ../ sequences) to access or delete files outside the intended directory scope. The vulnerability can be exploited remotely without user interaction but requires low privileges (PR:L), indicating that the attacker must have some authenticated access, albeit minimal. The CVSS 4.0 score is 5.3 (medium), reflecting network attack vector, low complexity, no user interaction, and limited impact on confidentiality, integrity, and availability. The vendor follows a rolling release strategy but has not responded to the vulnerability disclosure, and no patches or mitigations have been published. Public exploit code is available, increasing the risk of exploitation despite no current reports of active attacks. The vulnerability could allow attackers to read or delete sensitive files, potentially leading to information disclosure or disruption of service. Organizations using baowzh hfly should assess exposure and implement compensating controls promptly.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity. Attackers with low-level access could exploit the path traversal to access sensitive configuration files, user data, or system files, potentially leading to data breaches or unauthorized data manipulation. Deletion of critical files could disrupt application availability or functionality. The lack of vendor response and patches increases the window of exposure. Organizations in sectors such as government, finance, healthcare, or critical infrastructure using baowzh hfly may face increased risk due to the sensitivity of their data and regulatory requirements like GDPR. Exploitation could result in compliance violations, reputational damage, and operational disruptions. The public availability of exploit code lowers the barrier for attackers, necessitating urgent mitigation. However, the requirement for low privileges limits exploitation to insiders or attackers who have already compromised user credentials or accounts with limited access.

Mitigation Recommendations

1. Restrict access to the /admin/index.php/datafile/delfile endpoint to trusted administrators only, using network segmentation, IP whitelisting, or VPNs. 2. Implement strict input validation and sanitization on the filename parameter to reject any path traversal sequences such as '../'. 3. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting this endpoint. 4. Monitor logs for unusual file access or deletion activities, especially around the vulnerable endpoint. 5. Enforce the principle of least privilege for user accounts to minimize the impact of compromised credentials. 6. If possible, isolate the application environment to limit file system access and prevent unauthorized file operations. 7. Engage with the vendor or community to track any forthcoming patches or updates and apply them promptly. 8. Consider alternative software solutions if the vendor remains unresponsive and the risk is unacceptable. 9. Conduct regular security audits and penetration tests focusing on file handling functionalities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-11T07:00:40.587Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693ae5917d4c6f31f7b66fe5

Added to database: 12/11/2025, 3:38:57 PM

Last enriched: 12/11/2025, 3:55:42 PM

Last updated: 12/12/2025, 3:13:08 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats