Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66410: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in flipped-aurora gin-vue-admin

0
High
VulnerabilityCVE-2025-66410cvecve-2025-66410cwe-22
Published: Mon Dec 01 2025 (12/01/2025, 22:28:59 UTC)
Source: CVE Database V5
Vendor/Project: flipped-aurora
Product: gin-vue-admin

Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

AI-Powered Analysis

AILast updated: 12/08/2025, 23:17:21 UTC

Technical Analysis

CVE-2025-66410 is a path traversal vulnerability identified in the flipped-aurora gin-vue-admin backstage management system, specifically affecting versions 2.8.6 and earlier. The vulnerability arises due to improper validation and limitation of the 'FileMd5' parameter, which attackers can manipulate to traverse directories and delete arbitrary files or folders on the server. This flaw violates secure coding practices by failing to restrict pathname inputs to a safe directory scope, classified under CWE-22. Exploitation requires no authentication, user interaction, or privileges, and can be performed remotely over the network. The vulnerability has a CVSS 4.0 score of 8.7 (high severity), reflecting its ease of exploitation (attack vector: network, attack complexity: low) and the high impact on integrity and availability, as attackers can delete critical files causing server damage or downtime. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The affected product, gin-vue-admin, is a popular Vue and Gin-based backend management system used in various organizational IT infrastructures for administrative tasks. The ability to delete arbitrary files can lead to denial of service, data loss, and potential further compromise if critical system or application files are removed.

Potential Impact

For European organizations using gin-vue-admin versions 2.8.6 or earlier, this vulnerability poses a significant risk of operational disruption due to potential deletion of critical files or folders on backend servers. This can result in denial of service, loss of administrative control, and potential data loss. Organizations in sectors relying heavily on backend management systems—such as finance, healthcare, government, and critical infrastructure—may face increased risk of downtime and reputational damage. The lack of authentication requirement means any external attacker scanning for vulnerable instances could exploit this flaw, increasing the threat surface. Additionally, the deletion of files could be leveraged as a stepping stone for further attacks or to cover tracks after other intrusions. The impact on confidentiality is limited, but integrity and availability are severely affected. Given the widespread use of Vue and Gin frameworks in Europe, the vulnerability could affect a broad range of organizations if not mitigated promptly.

Mitigation Recommendations

1. Immediate upgrade to a fixed version of gin-vue-admin once available; monitor vendor announcements for patches. 2. In the absence of a patch, implement strict input validation and sanitization on the 'FileMd5' parameter to prevent directory traversal sequences (e.g., '..', absolute paths). 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests attempting path traversal or file deletion operations. 4. Restrict file system permissions for the application user to the minimum necessary, preventing deletion of critical system or application files. 5. Monitor server logs for unusual file deletion requests or errors related to file operations. 6. Conduct regular backups of critical data and configuration files to enable recovery in case of successful exploitation. 7. Network segmentation to limit exposure of backend management interfaces to trusted internal networks or VPNs. 8. Use runtime application self-protection (RASP) tools if available to detect and block malicious input patterns in real time.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-28T23:33:56.365Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692e19186dbd3477d74d63d4

Added to database: 12/1/2025, 10:39:20 PM

Last enriched: 12/8/2025, 11:17:21 PM

Last updated: 1/16/2026, 3:11:22 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats