Skip to main content

CVE-2025-7625: Path Traversal in YiJiuSmile kkFileViewOfficeEdit

Medium
VulnerabilityCVE-2025-7625cvecve-2025-7625
Published: Mon Jul 14 2025 (07/14/2025, 16:14:05 UTC)
Source: CVE Database V5
Vendor/Project: YiJiuSmile
Product: kkFileViewOfficeEdit

Description

A vulnerability, which was classified as critical, was found in YiJiuSmile kkFileViewOfficeEdit up to 5fbc57c48e8fe6c1b91e0e7995e2d59615f37abd. Affected is the function Download of the file /download. The manipulation of the argument url leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.

AI-Powered Analysis

AILast updated: 07/14/2025, 16:46:09 UTC

Technical Analysis

CVE-2025-7625 is a path traversal vulnerability identified in the YiJiuSmile kkFileViewOfficeEdit product, specifically affecting the Download function accessible via the /download endpoint. The vulnerability arises from improper validation or sanitization of the 'url' parameter, which an attacker can manipulate to traverse directories on the server's filesystem. This allows unauthorized access to files outside the intended directory scope. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing its risk profile. The product uses continuous delivery with rolling releases, complicating precise version tracking and patch availability. The CVSS 4.0 score is 5.3 (medium severity), reflecting network attack vector, low complexity, no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. No public exploits are currently known, but the vulnerability details have been disclosed publicly, which could facilitate future exploitation. The lack of available patches or version details means organizations must rely on mitigation strategies until an official fix is released.

Potential Impact

For European organizations, this vulnerability presents a risk of unauthorized data disclosure, as attackers could access sensitive files stored on servers running kkFileViewOfficeEdit. This could include configuration files, credentials, or proprietary documents, potentially leading to data breaches or further compromise. The ability to exploit remotely without authentication increases the threat to internet-facing deployments. While the impact on integrity and availability is limited, the confidentiality breach could have regulatory implications under GDPR, especially if personal or sensitive data is exposed. Organizations in sectors with high compliance requirements (finance, healthcare, government) are particularly at risk. Additionally, the continuous delivery model of the product may delay patch deployment, prolonging exposure. Attackers could leverage this vulnerability as a foothold for lateral movement or to gather intelligence on the target environment.

Mitigation Recommendations

European organizations should implement strict input validation and filtering at the web application firewall (WAF) or reverse proxy level to block suspicious path traversal patterns in URL parameters, such as sequences containing '../'. Network segmentation should be enforced to limit access to critical file servers and sensitive directories. Monitoring and logging of access to the /download endpoint should be enhanced to detect anomalous requests indicative of exploitation attempts. Until an official patch is available, consider disabling or restricting access to the vulnerable Download function if feasible. Employ the principle of least privilege on file system permissions to minimize accessible files by the application user. Regularly review and update incident response plans to include scenarios involving path traversal attacks. Engage with the vendor for timely updates and patches, and test any updates in a controlled environment before deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-14T07:46:44.996Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687530c7a83201eaacc8223c

Added to database: 7/14/2025, 4:31:03 PM

Last enriched: 7/14/2025, 4:46:09 PM

Last updated: 7/15/2025, 11:43:46 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats