Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14965: Path Traversal in 1541492390c yougou-mall

0
Medium
VulnerabilityCVE-2025-14965cvecve-2025-14965
Published: Fri Dec 19 2025 (12/19/2025, 19:02:09 UTC)
Source: CVE Database V5
Vendor/Project: 1541492390c
Product: yougou-mall

Description

A vulnerability was found in 1541492390c yougou-mall up to 0a771fa817c924efe52c8fe0a9a6658eee675f9f. This impacts the function upload/delete of the file src/main/java/per/ccm/ygmall/extra/controller/ResourceController.java. Performing manipulation results in path traversal. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.

AI-Powered Analysis

AILast updated: 12/31/2025, 00:08:12 UTC

Technical Analysis

CVE-2025-14965 identifies a path traversal vulnerability in the yougou-mall application, a product developed by 1541492390c. The vulnerability resides in the upload and delete functions within the ResourceController.java file, which handles file operations. Specifically, improper validation or sanitization of user-supplied input allows an attacker to manipulate file paths to traverse directories beyond the intended scope. This can lead to unauthorized access, modification, or deletion of files on the server. The vulnerability is exploitable remotely with low complexity, requiring only low-level privileges (PR:L) and no user interaction (UI:N). The CVSS 4.0 vector indicates an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required for attack initiation beyond low privileges, and limited impact on confidentiality, integrity, and availability (each rated low). The product employs a rolling release model, which means no fixed version numbers are available for affected or patched releases, complicating patch management. No known exploits have been reported in the wild, but the vulnerability poses a risk due to the sensitive nature of file operations in web applications. The path traversal issue can be leveraged to access sensitive configuration files, application data, or system files, potentially leading to further compromise or service disruption.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for those operating e-commerce platforms or web services using yougou-mall. Unauthorized file access or deletion can lead to data breaches, loss of customer trust, and disruption of business operations. Confidential information such as customer data, payment details, or internal configurations could be exposed or altered. Integrity of the application and its data may be compromised, potentially enabling further attacks or fraud. Availability could also be affected if critical files are deleted or corrupted, resulting in downtime. Given the medium severity and the ease of exploitation with low privileges, attackers with limited access could escalate their impact. The lack of fixed versioning complicates timely patching, increasing the window of exposure. Compliance with European data protection regulations (e.g., GDPR) could be jeopardized if personal data is exposed or mishandled due to this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-14965 effectively, organizations should implement strict input validation and sanitization on all file path parameters in the upload and delete functions. Employ allowlists for file names and paths to restrict operations to authorized directories only. Implement robust access controls ensuring that only authenticated and authorized users can perform file operations, with the principle of least privilege applied. Use secure coding practices to avoid direct concatenation of user input into file paths. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with rules to detect and block path traversal attempts. Monitor logs for unusual file access patterns or errors indicative of traversal attempts. Since the product uses a rolling release, establish a process to track updates continuously and apply patches promptly once available. Conduct regular security assessments and code reviews focusing on file handling components. If possible, isolate the file storage system from critical system files to limit impact. Finally, educate developers and administrators about secure file handling and the risks of path traversal vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-19T10:35:32.198Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6945a4610919c128849db32a

Added to database: 12/19/2025, 7:15:45 PM

Last enriched: 12/31/2025, 12:08:12 AM

Last updated: 2/6/2026, 12:00:28 PM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats