CVE-2025-7625: Path Traversal in YiJiuSmile kkFileViewOfficeEdit
A vulnerability, which was classified as critical, was found in YiJiuSmile kkFileViewOfficeEdit up to 5fbc57c48e8fe6c1b91e0e7995e2d59615f37abd. Affected is the function Download of the file /download. The manipulation of the argument url leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
AI Analysis
Technical Summary
CVE-2025-7625 is a path traversal vulnerability identified in the YiJiuSmile kkFileViewOfficeEdit product, specifically affecting the Download function accessible via the /download endpoint. The vulnerability arises from improper validation or sanitization of the 'url' argument, which an attacker can manipulate to traverse directories on the server's filesystem. This allows unauthorized access to files outside the intended directory scope. The vulnerability can be exploited remotely without requiring user interaction or authentication, increasing its risk profile. The product uses continuous delivery with rolling releases, complicating precise version tracking and patch availability. The CVSS 4.0 score is 5.3 (medium severity), reflecting that while the vulnerability is remotely exploitable with low complexity and no user interaction, it requires low privileges (PR:L) and results in limited confidentiality impact (VC:L) without affecting integrity or availability. No known exploits are currently reported in the wild, but public disclosure of the exploit code exists, which could facilitate future attacks. The lack of patch links indicates that remediation may not yet be available or clearly communicated. This vulnerability could allow attackers to read sensitive files on the server, potentially exposing configuration files, credentials, or other sensitive data, leading to further compromise.
Potential Impact
For European organizations using YiJiuSmile kkFileViewOfficeEdit, this vulnerability poses a risk of unauthorized data disclosure through remote exploitation. Sensitive internal documents, configuration files, or credentials stored on affected servers could be exposed, undermining confidentiality. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential lateral movement within networks. Since kkFileViewOfficeEdit is a document viewing/editing tool, it may be integrated into enterprise workflows, increasing the likelihood of sensitive information exposure. The medium severity rating suggests moderate risk, but the ease of remote exploitation without user interaction or authentication elevates concern. Organizations in sectors with strict data protection requirements (finance, healthcare, government) are particularly vulnerable. The continuous delivery model complicates patch management, potentially delaying remediation and prolonging exposure.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the /download endpoint via network controls such as firewalls or web application firewalls (WAFs) to trusted IP ranges only. 2. Implement input validation and sanitization on the 'url' parameter to prevent directory traversal sequences (e.g., '..', '%2e%2e'). 3. Employ least privilege principles on the server filesystem to limit the accessible directories and files by the kkFileViewOfficeEdit service account. 4. Monitor logs for suspicious access patterns targeting the /download endpoint or unusual file access attempts. 5. Engage with the vendor or community to obtain updates or patches as soon as they become available, given the rolling release model. 6. Consider deploying runtime application self-protection (RASP) tools to detect and block exploitation attempts in real time. 7. Conduct a thorough audit of exposed files and credentials to assess potential data leakage and rotate any compromised secrets. 8. Educate IT and security teams about this specific vulnerability to ensure rapid response to any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-7625: Path Traversal in YiJiuSmile kkFileViewOfficeEdit
Description
A vulnerability, which was classified as critical, was found in YiJiuSmile kkFileViewOfficeEdit up to 5fbc57c48e8fe6c1b91e0e7995e2d59615f37abd. Affected is the function Download of the file /download. The manipulation of the argument url leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-7625 is a path traversal vulnerability identified in the YiJiuSmile kkFileViewOfficeEdit product, specifically affecting the Download function accessible via the /download endpoint. The vulnerability arises from improper validation or sanitization of the 'url' argument, which an attacker can manipulate to traverse directories on the server's filesystem. This allows unauthorized access to files outside the intended directory scope. The vulnerability can be exploited remotely without requiring user interaction or authentication, increasing its risk profile. The product uses continuous delivery with rolling releases, complicating precise version tracking and patch availability. The CVSS 4.0 score is 5.3 (medium severity), reflecting that while the vulnerability is remotely exploitable with low complexity and no user interaction, it requires low privileges (PR:L) and results in limited confidentiality impact (VC:L) without affecting integrity or availability. No known exploits are currently reported in the wild, but public disclosure of the exploit code exists, which could facilitate future attacks. The lack of patch links indicates that remediation may not yet be available or clearly communicated. This vulnerability could allow attackers to read sensitive files on the server, potentially exposing configuration files, credentials, or other sensitive data, leading to further compromise.
Potential Impact
For European organizations using YiJiuSmile kkFileViewOfficeEdit, this vulnerability poses a risk of unauthorized data disclosure through remote exploitation. Sensitive internal documents, configuration files, or credentials stored on affected servers could be exposed, undermining confidentiality. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential lateral movement within networks. Since kkFileViewOfficeEdit is a document viewing/editing tool, it may be integrated into enterprise workflows, increasing the likelihood of sensitive information exposure. The medium severity rating suggests moderate risk, but the ease of remote exploitation without user interaction or authentication elevates concern. Organizations in sectors with strict data protection requirements (finance, healthcare, government) are particularly vulnerable. The continuous delivery model complicates patch management, potentially delaying remediation and prolonging exposure.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the /download endpoint via network controls such as firewalls or web application firewalls (WAFs) to trusted IP ranges only. 2. Implement input validation and sanitization on the 'url' parameter to prevent directory traversal sequences (e.g., '..', '%2e%2e'). 3. Employ least privilege principles on the server filesystem to limit the accessible directories and files by the kkFileViewOfficeEdit service account. 4. Monitor logs for suspicious access patterns targeting the /download endpoint or unusual file access attempts. 5. Engage with the vendor or community to obtain updates or patches as soon as they become available, given the rolling release model. 6. Consider deploying runtime application self-protection (RASP) tools to detect and block exploitation attempts in real time. 7. Conduct a thorough audit of exposed files and credentials to assess potential data leakage and rotate any compromised secrets. 8. Educate IT and security teams about this specific vulnerability to ensure rapid response to any exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-14T07:46:44.996Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687530c7a83201eaacc8223c
Added to database: 7/14/2025, 4:31:03 PM
Last enriched: 7/21/2025, 9:01:18 PM
Last updated: 8/30/2025, 8:24:32 PM
Views: 34
Related Threats
CVE-2025-9749: SQL Injection in HKritesh009 Grocery List Management Web App
MediumCVE-2025-9748: Stack-based Buffer Overflow in Tenda CH22
HighCVE-2025-9747: Cross-Site Request Forgery in Koillection
MediumCVE-2025-9746: Cross Site Scripting in Campcodes Hospital Management System
MediumCVE-2025-9745: OS Command Injection in D-Link DI-500WF
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.