CVE-2025-5381: Path Traversal in Yifang CMS
A vulnerability, which was classified as problematic, was found in Yifang CMS up to 2.0.2. Affected is the function downloadFile of the file /api/File/downloadFile of the component Admin Panel. The manipulation of the argument File leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5381 is a path traversal vulnerability identified in Yifang CMS versions up to 2.0.2, specifically within the Admin Panel component's downloadFile function located at /api/File/downloadFile. The vulnerability arises from improper validation or sanitization of the 'File' argument, which allows an attacker to manipulate the file path input to traverse directories outside the intended scope. This can enable unauthorized access to arbitrary files on the server's filesystem. The vulnerability is remotely exploitable without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:H). However, it does require high privileges (PR:H), meaning the attacker must have some level of authenticated access with elevated permissions to exploit it. The CVSS score of 5.1 (medium severity) reflects this balance between ease of exploitation and impact. The vulnerability does not affect confidentiality, integrity, or availability directly but can lead to information disclosure by reading sensitive files. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. The vulnerability was published on May 31, 2025, and is classified as problematic due to the potential for unauthorized file access within the CMS environment.
Potential Impact
For European organizations using Yifang CMS versions 2.0.0 through 2.0.2, this vulnerability poses a moderate risk primarily related to unauthorized information disclosure. Attackers with elevated privileges could exploit the path traversal flaw to access sensitive configuration files, credentials, or other critical data stored on the CMS server. This could lead to further compromise or lateral movement within the network. While the vulnerability does not directly allow remote code execution or denial of service, the exposure of sensitive files can undermine the confidentiality and integrity of organizational data. European organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on Yifang CMS for content management may face increased risk, especially if internal access controls are weak or if attackers can escalate privileges to the required level. The lack of public exploits reduces immediate risk, but the public disclosure means attackers could develop exploits, increasing the threat over time.
Mitigation Recommendations
Organizations should immediately audit their use of Yifang CMS and identify any installations running affected versions (2.0.0 to 2.0.2). Since no official patches are currently available, mitigation should focus on restricting access to the Admin Panel and the /api/File/downloadFile endpoint to trusted administrators only, ideally via network segmentation and firewall rules. Implement strict access controls and monitor for unusual file access patterns or attempts to exploit path traversal. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal payloads targeting the 'File' parameter. Additionally, review and harden CMS configuration to minimize sensitive file exposure and ensure logging is enabled for audit trails. Organizations should engage with Yifang CMS vendors for updates or patches and plan for timely application once released. Finally, conduct regular security assessments and penetration testing to detect any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-5381: Path Traversal in Yifang CMS
Description
A vulnerability, which was classified as problematic, was found in Yifang CMS up to 2.0.2. Affected is the function downloadFile of the file /api/File/downloadFile of the component Admin Panel. The manipulation of the argument File leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5381 is a path traversal vulnerability identified in Yifang CMS versions up to 2.0.2, specifically within the Admin Panel component's downloadFile function located at /api/File/downloadFile. The vulnerability arises from improper validation or sanitization of the 'File' argument, which allows an attacker to manipulate the file path input to traverse directories outside the intended scope. This can enable unauthorized access to arbitrary files on the server's filesystem. The vulnerability is remotely exploitable without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:H). However, it does require high privileges (PR:H), meaning the attacker must have some level of authenticated access with elevated permissions to exploit it. The CVSS score of 5.1 (medium severity) reflects this balance between ease of exploitation and impact. The vulnerability does not affect confidentiality, integrity, or availability directly but can lead to information disclosure by reading sensitive files. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. The vulnerability was published on May 31, 2025, and is classified as problematic due to the potential for unauthorized file access within the CMS environment.
Potential Impact
For European organizations using Yifang CMS versions 2.0.0 through 2.0.2, this vulnerability poses a moderate risk primarily related to unauthorized information disclosure. Attackers with elevated privileges could exploit the path traversal flaw to access sensitive configuration files, credentials, or other critical data stored on the CMS server. This could lead to further compromise or lateral movement within the network. While the vulnerability does not directly allow remote code execution or denial of service, the exposure of sensitive files can undermine the confidentiality and integrity of organizational data. European organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on Yifang CMS for content management may face increased risk, especially if internal access controls are weak or if attackers can escalate privileges to the required level. The lack of public exploits reduces immediate risk, but the public disclosure means attackers could develop exploits, increasing the threat over time.
Mitigation Recommendations
Organizations should immediately audit their use of Yifang CMS and identify any installations running affected versions (2.0.0 to 2.0.2). Since no official patches are currently available, mitigation should focus on restricting access to the Admin Panel and the /api/File/downloadFile endpoint to trusted administrators only, ideally via network segmentation and firewall rules. Implement strict access controls and monitor for unusual file access patterns or attempts to exploit path traversal. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal payloads targeting the 'File' parameter. Additionally, review and harden CMS configuration to minimize sensitive file exposure and ensure logging is enabled for audit trails. Organizations should engage with Yifang CMS vendors for updates or patches and plan for timely application once released. Finally, conduct regular security assessments and penetration testing to detect any exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-30T12:30:07.011Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683b1598182aa0cae2e5fe45
Added to database: 5/31/2025, 2:43:36 PM
Last enriched: 7/9/2025, 12:54:42 AM
Last updated: 8/7/2025, 12:44:20 AM
Views: 15
Related Threats
CVE-2025-8914: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WellChoose Organization Portal System
HighCVE-2025-8913: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in WellChoose Organization Portal System
CriticalCVE-2025-8912: CWE-36 Absolute Path Traversal in WellChoose Organization Portal System
HighCVE-2025-8911: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in WellChoose Organization Portal System
MediumCVE-2025-8910: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in WellChoose Organization Portal System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.