Skip to main content

CVE-2025-7626: Path Traversal in YiJiuSmile kkFileViewOfficeEdit

Medium
VulnerabilityCVE-2025-7626cvecve-2025-7626
Published: Mon Jul 14 2025 (07/14/2025, 17:02:05 UTC)
Source: CVE Database V5
Vendor/Project: YiJiuSmile
Product: kkFileViewOfficeEdit

Description

A vulnerability has been found in YiJiuSmile kkFileViewOfficeEdit up to 5fbc57c48e8fe6c1b91e0e7995e2d59615f37abd and classified as critical. Affected by this vulnerability is the function onlinePreview of the file /onlinePreview. The manipulation of the argument url leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.

AI-Powered Analysis

AILast updated: 07/14/2025, 17:31:09 UTC

Technical Analysis

CVE-2025-7626 is a path traversal vulnerability identified in the YiJiuSmile kkFileViewOfficeEdit product, specifically affecting the onlinePreview function accessed via the /onlinePreview endpoint. The vulnerability arises from improper sanitization or validation of the 'url' parameter, allowing an attacker to manipulate this argument to traverse directories on the server filesystem. This can lead to unauthorized access to files outside the intended directory scope. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing its risk profile. The affected version is identified by the commit hash 5fbc57c48e8fe6c1b91e0e7995e2d59615f37abd, but due to the product's lack of versioning, it is unclear which other versions may be impacted. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low complexity, no privileges or user interaction needed, and limited impact confined to confidentiality. While no public exploits are currently known in the wild, the disclosure of the vulnerability and its exploit details increases the likelihood of exploitation attempts. Path traversal vulnerabilities can enable attackers to read sensitive configuration files, source code, or other critical data, potentially leading to further compromise or information leakage. The absence of patch links suggests that a fix may not yet be available, emphasizing the need for immediate mitigation efforts.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized data disclosure and potential escalation of attacks if sensitive files are accessed. Organizations using kkFileViewOfficeEdit for document previewing, especially in sectors handling sensitive or regulated data (e.g., finance, healthcare, government), could face confidentiality breaches. The ability to remotely exploit without authentication means attackers can target exposed instances over the internet, increasing the attack surface. Compromised systems could lead to loss of trust, regulatory penalties under GDPR if personal data is exposed, and operational disruptions if attackers leverage accessed files to pivot within networks. Given the product's niche usage, impact may be concentrated in organizations relying on this specific software for office document handling and previewing.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the /onlinePreview endpoint via network controls such as firewalls or VPNs to limit exposure to trusted users only. 2. Implement web application firewall (WAF) rules to detect and block path traversal patterns in the 'url' parameter, such as sequences containing '../' or encoded variants. 3. Conduct thorough input validation and sanitization on the 'url' parameter to ensure it cannot reference files outside the intended directory scope. 4. If possible, isolate the kkFileViewOfficeEdit service in a sandboxed environment with minimal file system permissions to limit the impact of potential exploitation. 5. Monitor logs for suspicious access patterns or attempts to exploit path traversal. 6. Engage with the vendor or community to obtain patches or updates addressing the vulnerability. 7. As a longer-term measure, consider migrating to alternative document preview solutions with active maintenance and versioning to reduce exposure to unpatched vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-14T07:46:50.800Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68753b53a83201eaacc84e8a

Added to database: 7/14/2025, 5:16:03 PM

Last enriched: 7/14/2025, 5:31:09 PM

Last updated: 7/16/2025, 8:25:06 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats