Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15589: Path Traversal in MuYuCMS

0
Medium
VulnerabilityCVE-2025-15589cvecve-2025-15589
Published: Tue Feb 24 2026 (02/24/2026, 05:52:29 UTC)
Source: CVE Database V5
Product: MuYuCMS

Description

CVE-2025-15589 is a medium severity path traversal vulnerability in MuYuCMS version 2. 7, specifically in the delete_dir_file function of the Template Management Page component. The vulnerability allows remote attackers to manipulate the temn/tp argument to traverse directories and potentially delete arbitrary files. Exploitation does not require user interaction but does require high privileges, and the vendor has not responded to the disclosure. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The CVSS 4. 0 base score is 5. 1, reflecting limited impact on confidentiality and integrity but some impact on availability. Organizations using MuYuCMS 2. 7 should prioritize patching or mitigating this issue to prevent unauthorized file deletions and potential service disruptions.

AI-Powered Analysis

AILast updated: 02/24/2026, 06:31:32 UTC

Technical Analysis

CVE-2025-15589 identifies a path traversal vulnerability in MuYuCMS version 2.7, located in the delete_dir_file function within the Template Management Page component (application/admin/controller/Template.php). The vulnerability arises from improper validation or sanitization of the temn/tp argument, which attackers can manipulate to traverse directories outside the intended scope. This flaw enables remote attackers to delete arbitrary files or directories on the server by crafting malicious requests targeting this function. The vulnerability requires high privileges (PR:H) but does not require authentication (AT:N) or user interaction (UI:N), indicating that an attacker with elevated access could exploit it remotely without user involvement. The CVSS 4.0 vector indicates no impact on confidentiality or integrity but low impact on availability, suggesting that the primary risk is disruption through deletion of files. The vendor was notified early but did not respond, and no patches have been released yet. Although no known exploits are currently in the wild, the public disclosure increases the likelihood of exploitation attempts. The vulnerability affects only MuYuCMS version 2.7, a content management system used primarily in certain markets. The lack of vendor response and absence of patches necessitate immediate mitigation efforts by users.

Potential Impact

The primary impact of this vulnerability is the potential deletion of arbitrary files or directories on affected servers, which can lead to partial or full service disruption. This could cause website downtime, loss of critical template files, or corruption of the CMS installation, impacting availability. Since the vulnerability does not affect confidentiality or integrity directly, data theft or unauthorized data modification is less likely. However, the deletion of files could indirectly lead to integrity issues if backups are not available or if critical system files are removed. Organizations relying on MuYuCMS 2.7 for their web presence or internal portals could face operational disruptions, reputational damage, and increased recovery costs. The requirement for high privileges to exploit the vulnerability limits the attack surface but does not eliminate risk, especially in environments where administrative access is not tightly controlled. The public disclosure without a vendor patch increases the urgency for mitigation to prevent exploitation by opportunistic attackers.

Mitigation Recommendations

1. Immediately restrict access to the Template Management Page and the delete_dir_file function to trusted administrators only, using network segmentation and access control lists. 2. Implement strict input validation and sanitization on the temn/tp parameter at the application or web server level to block path traversal characters such as '../'. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal attempts targeting the vulnerable endpoint. 4. Regularly back up all CMS files and templates to enable rapid recovery in case of file deletion. 5. Monitor server and application logs for unusual deletion requests or errors related to template files. 6. If possible, disable or remove the delete_dir_file functionality temporarily until a vendor patch is available. 7. Limit administrative privileges strictly to reduce the risk of exploitation by insiders or compromised accounts. 8. Stay alert for vendor updates or community patches and apply them promptly once available. 9. Conduct security audits and penetration tests focusing on path traversal and file deletion vulnerabilities within the CMS environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-23T10:37:19.880Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699d4271be58cf853b689cc7

Added to database: 2/24/2026, 6:17:21 AM

Last enriched: 2/24/2026, 6:31:32 AM

Last updated: 2/24/2026, 7:26:18 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats