CVE-2025-15589: Path Traversal in MuYuCMS
CVE-2025-15589 is a medium severity path traversal vulnerability in MuYuCMS version 2. 7, specifically in the delete_dir_file function of the Template Management Page component. The vulnerability allows remote attackers to manipulate the temn/tp argument to traverse directories and potentially delete arbitrary files. Exploitation does not require user interaction but does require high privileges, and the vendor has not responded to the disclosure. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The CVSS 4. 0 base score is 5. 1, reflecting limited impact on confidentiality and integrity but some impact on availability. Organizations using MuYuCMS 2. 7 should prioritize patching or mitigating this issue to prevent unauthorized file deletions and potential service disruptions.
AI Analysis
Technical Summary
CVE-2025-15589 identifies a path traversal vulnerability in MuYuCMS version 2.7, located in the delete_dir_file function within the Template Management Page component (application/admin/controller/Template.php). The vulnerability arises from improper validation or sanitization of the temn/tp argument, which attackers can manipulate to traverse directories outside the intended scope. This flaw enables remote attackers to delete arbitrary files or directories on the server by crafting malicious requests targeting this function. The vulnerability requires high privileges (PR:H) but does not require authentication (AT:N) or user interaction (UI:N), indicating that an attacker with elevated access could exploit it remotely without user involvement. The CVSS 4.0 vector indicates no impact on confidentiality or integrity but low impact on availability, suggesting that the primary risk is disruption through deletion of files. The vendor was notified early but did not respond, and no patches have been released yet. Although no known exploits are currently in the wild, the public disclosure increases the likelihood of exploitation attempts. The vulnerability affects only MuYuCMS version 2.7, a content management system used primarily in certain markets. The lack of vendor response and absence of patches necessitate immediate mitigation efforts by users.
Potential Impact
The primary impact of this vulnerability is the potential deletion of arbitrary files or directories on affected servers, which can lead to partial or full service disruption. This could cause website downtime, loss of critical template files, or corruption of the CMS installation, impacting availability. Since the vulnerability does not affect confidentiality or integrity directly, data theft or unauthorized data modification is less likely. However, the deletion of files could indirectly lead to integrity issues if backups are not available or if critical system files are removed. Organizations relying on MuYuCMS 2.7 for their web presence or internal portals could face operational disruptions, reputational damage, and increased recovery costs. The requirement for high privileges to exploit the vulnerability limits the attack surface but does not eliminate risk, especially in environments where administrative access is not tightly controlled. The public disclosure without a vendor patch increases the urgency for mitigation to prevent exploitation by opportunistic attackers.
Mitigation Recommendations
1. Immediately restrict access to the Template Management Page and the delete_dir_file function to trusted administrators only, using network segmentation and access control lists. 2. Implement strict input validation and sanitization on the temn/tp parameter at the application or web server level to block path traversal characters such as '../'. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal attempts targeting the vulnerable endpoint. 4. Regularly back up all CMS files and templates to enable rapid recovery in case of file deletion. 5. Monitor server and application logs for unusual deletion requests or errors related to template files. 6. If possible, disable or remove the delete_dir_file functionality temporarily until a vendor patch is available. 7. Limit administrative privileges strictly to reduce the risk of exploitation by insiders or compromised accounts. 8. Stay alert for vendor updates or community patches and apply them promptly once available. 9. Conduct security audits and penetration tests focusing on path traversal and file deletion vulnerabilities within the CMS environment.
Affected Countries
China, Vietnam, Indonesia, Malaysia, Thailand, India, United States, Germany, Russia, Brazil
CVE-2025-15589: Path Traversal in MuYuCMS
Description
CVE-2025-15589 is a medium severity path traversal vulnerability in MuYuCMS version 2. 7, specifically in the delete_dir_file function of the Template Management Page component. The vulnerability allows remote attackers to manipulate the temn/tp argument to traverse directories and potentially delete arbitrary files. Exploitation does not require user interaction but does require high privileges, and the vendor has not responded to the disclosure. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The CVSS 4. 0 base score is 5. 1, reflecting limited impact on confidentiality and integrity but some impact on availability. Organizations using MuYuCMS 2. 7 should prioritize patching or mitigating this issue to prevent unauthorized file deletions and potential service disruptions.
AI-Powered Analysis
Technical Analysis
CVE-2025-15589 identifies a path traversal vulnerability in MuYuCMS version 2.7, located in the delete_dir_file function within the Template Management Page component (application/admin/controller/Template.php). The vulnerability arises from improper validation or sanitization of the temn/tp argument, which attackers can manipulate to traverse directories outside the intended scope. This flaw enables remote attackers to delete arbitrary files or directories on the server by crafting malicious requests targeting this function. The vulnerability requires high privileges (PR:H) but does not require authentication (AT:N) or user interaction (UI:N), indicating that an attacker with elevated access could exploit it remotely without user involvement. The CVSS 4.0 vector indicates no impact on confidentiality or integrity but low impact on availability, suggesting that the primary risk is disruption through deletion of files. The vendor was notified early but did not respond, and no patches have been released yet. Although no known exploits are currently in the wild, the public disclosure increases the likelihood of exploitation attempts. The vulnerability affects only MuYuCMS version 2.7, a content management system used primarily in certain markets. The lack of vendor response and absence of patches necessitate immediate mitigation efforts by users.
Potential Impact
The primary impact of this vulnerability is the potential deletion of arbitrary files or directories on affected servers, which can lead to partial or full service disruption. This could cause website downtime, loss of critical template files, or corruption of the CMS installation, impacting availability. Since the vulnerability does not affect confidentiality or integrity directly, data theft or unauthorized data modification is less likely. However, the deletion of files could indirectly lead to integrity issues if backups are not available or if critical system files are removed. Organizations relying on MuYuCMS 2.7 for their web presence or internal portals could face operational disruptions, reputational damage, and increased recovery costs. The requirement for high privileges to exploit the vulnerability limits the attack surface but does not eliminate risk, especially in environments where administrative access is not tightly controlled. The public disclosure without a vendor patch increases the urgency for mitigation to prevent exploitation by opportunistic attackers.
Mitigation Recommendations
1. Immediately restrict access to the Template Management Page and the delete_dir_file function to trusted administrators only, using network segmentation and access control lists. 2. Implement strict input validation and sanitization on the temn/tp parameter at the application or web server level to block path traversal characters such as '../'. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal attempts targeting the vulnerable endpoint. 4. Regularly back up all CMS files and templates to enable rapid recovery in case of file deletion. 5. Monitor server and application logs for unusual deletion requests or errors related to template files. 6. If possible, disable or remove the delete_dir_file functionality temporarily until a vendor patch is available. 7. Limit administrative privileges strictly to reduce the risk of exploitation by insiders or compromised accounts. 8. Stay alert for vendor updates or community patches and apply them promptly once available. 9. Conduct security audits and penetration tests focusing on path traversal and file deletion vulnerabilities within the CMS environment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-23T10:37:19.880Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699d4271be58cf853b689cc7
Added to database: 2/24/2026, 6:17:21 AM
Last enriched: 2/24/2026, 6:31:32 AM
Last updated: 2/24/2026, 7:26:18 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15386: CWE-79 Cross-Site Scripting (XSS) in Responsive Lightbox & Gallery
HighCVE-2026-24314: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in SAP_SE S/4HANA (Manage Payment Media)
MediumCVE-2026-3070: Cross Site Scripting in SourceCodester Modern Image Gallery App
MediumCVE-2026-3069: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3068: SQL Injection in itsourcecode Document Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.