CVE-2025-14965: Path Traversal in 1541492390c yougou-mall
A vulnerability was found in 1541492390c yougou-mall up to 0a771fa817c924efe52c8fe0a9a6658eee675f9f. This impacts the function upload/delete of the file src/main/java/per/ccm/ygmall/extra/controller/ResourceController.java. Performing manipulation results in path traversal. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
AI Analysis
Technical Summary
CVE-2025-14965 identifies a path traversal vulnerability in the yougou-mall application, a product developed by 1541492390c. The vulnerability resides in the upload and delete functions within the ResourceController.java file, which handles file operations. Specifically, improper validation or sanitization of user-supplied input allows an attacker to manipulate file paths to traverse directories beyond the intended scope. This can lead to unauthorized access, modification, or deletion of files on the server. The vulnerability is exploitable remotely with low complexity, requiring only low-level privileges (PR:L) and no user interaction (UI:N). The CVSS 4.0 vector indicates an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required for attack initiation beyond low privileges, and limited impact on confidentiality, integrity, and availability (each rated low). The product employs a rolling release model, which means no fixed version numbers are available for affected or patched releases, complicating patch management. No known exploits have been reported in the wild, but the vulnerability poses a risk due to the sensitive nature of file operations in web applications. The path traversal issue can be leveraged to access sensitive configuration files, application data, or system files, potentially leading to further compromise or service disruption.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those operating e-commerce platforms or web services using yougou-mall. Unauthorized file access or deletion can lead to data breaches, loss of customer trust, and disruption of business operations. Confidential information such as customer data, payment details, or internal configurations could be exposed or altered. Integrity of the application and its data may be compromised, potentially enabling further attacks or fraud. Availability could also be affected if critical files are deleted or corrupted, resulting in downtime. Given the medium severity and the ease of exploitation with low privileges, attackers with limited access could escalate their impact. The lack of fixed versioning complicates timely patching, increasing the window of exposure. Compliance with European data protection regulations (e.g., GDPR) could be jeopardized if personal data is exposed or mishandled due to this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-14965 effectively, organizations should implement strict input validation and sanitization on all file path parameters in the upload and delete functions. Employ allowlists for file names and paths to restrict operations to authorized directories only. Implement robust access controls ensuring that only authenticated and authorized users can perform file operations, with the principle of least privilege applied. Use secure coding practices to avoid direct concatenation of user input into file paths. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with rules to detect and block path traversal attempts. Monitor logs for unusual file access patterns or errors indicative of traversal attempts. Since the product uses a rolling release, establish a process to track updates continuously and apply patches promptly once available. Conduct regular security assessments and code reviews focusing on file handling components. If possible, isolate the file storage system from critical system files to limit impact. Finally, educate developers and administrators about secure file handling and the risks of path traversal vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-14965: Path Traversal in 1541492390c yougou-mall
Description
A vulnerability was found in 1541492390c yougou-mall up to 0a771fa817c924efe52c8fe0a9a6658eee675f9f. This impacts the function upload/delete of the file src/main/java/per/ccm/ygmall/extra/controller/ResourceController.java. Performing manipulation results in path traversal. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-14965 identifies a path traversal vulnerability in the yougou-mall application, a product developed by 1541492390c. The vulnerability resides in the upload and delete functions within the ResourceController.java file, which handles file operations. Specifically, improper validation or sanitization of user-supplied input allows an attacker to manipulate file paths to traverse directories beyond the intended scope. This can lead to unauthorized access, modification, or deletion of files on the server. The vulnerability is exploitable remotely with low complexity, requiring only low-level privileges (PR:L) and no user interaction (UI:N). The CVSS 4.0 vector indicates an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required for attack initiation beyond low privileges, and limited impact on confidentiality, integrity, and availability (each rated low). The product employs a rolling release model, which means no fixed version numbers are available for affected or patched releases, complicating patch management. No known exploits have been reported in the wild, but the vulnerability poses a risk due to the sensitive nature of file operations in web applications. The path traversal issue can be leveraged to access sensitive configuration files, application data, or system files, potentially leading to further compromise or service disruption.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those operating e-commerce platforms or web services using yougou-mall. Unauthorized file access or deletion can lead to data breaches, loss of customer trust, and disruption of business operations. Confidential information such as customer data, payment details, or internal configurations could be exposed or altered. Integrity of the application and its data may be compromised, potentially enabling further attacks or fraud. Availability could also be affected if critical files are deleted or corrupted, resulting in downtime. Given the medium severity and the ease of exploitation with low privileges, attackers with limited access could escalate their impact. The lack of fixed versioning complicates timely patching, increasing the window of exposure. Compliance with European data protection regulations (e.g., GDPR) could be jeopardized if personal data is exposed or mishandled due to this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-14965 effectively, organizations should implement strict input validation and sanitization on all file path parameters in the upload and delete functions. Employ allowlists for file names and paths to restrict operations to authorized directories only. Implement robust access controls ensuring that only authenticated and authorized users can perform file operations, with the principle of least privilege applied. Use secure coding practices to avoid direct concatenation of user input into file paths. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with rules to detect and block path traversal attempts. Monitor logs for unusual file access patterns or errors indicative of traversal attempts. Since the product uses a rolling release, establish a process to track updates continuously and apply patches promptly once available. Conduct regular security assessments and code reviews focusing on file handling components. If possible, isolate the file storage system from critical system files to limit impact. Finally, educate developers and administrators about secure file handling and the risks of path traversal vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-19T10:35:32.198Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6945a4610919c128849db32a
Added to database: 12/19/2025, 7:15:45 PM
Last enriched: 12/31/2025, 12:08:12 AM
Last updated: 2/7/2026, 6:48:22 PM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.