Skip to main content

CVE-2025-8226: Information Disclosure in yanyutao0402 ChanCMS

Medium
VulnerabilityCVE-2025-8226cvecve-2025-8226
Published: Sun Jul 27 2025 (07/27/2025, 08:32:11 UTC)
Source: CVE Database V5
Vendor/Project: yanyutao0402
Product: ChanCMS

Description

A vulnerability was found in yanyutao0402 ChanCMS up to 3.1.2. It has been classified as problematic. Affected is an unknown function of the file /sysApp/find. The manipulation of the argument accessKey/secretKey leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 08/04/2025, 00:59:00 UTC

Technical Analysis

CVE-2025-8226 is an information disclosure vulnerability affecting yanyutao0402's ChanCMS versions up to 3.1.2. The vulnerability resides in an unspecified function within the /sysApp/find file, where improper handling of the accessKey and secretKey parameters allows an attacker to remotely extract sensitive information. The vulnerability does not require user interaction and can be exploited over the network without authentication, making it accessible to remote attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, meaning low privileges are needed), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. The exploit has been publicly disclosed, increasing the risk of exploitation, although no active exploits in the wild have been reported yet. The vendor has addressed the issue in ChanCMS version 3.1.3, and upgrading to this version or later is recommended to remediate the vulnerability.

Potential Impact

For European organizations using ChanCMS versions 3.1.0 through 3.1.2, this vulnerability poses a risk of unauthorized disclosure of sensitive information, potentially including credentials or configuration data tied to accessKey and secretKey parameters. Such information leakage could facilitate further attacks such as privilege escalation, unauthorized access, or lateral movement within affected systems. The medium severity rating reflects that while the confidentiality impact is low, the ease of remote exploitation without user interaction or high privileges increases the threat. European organizations relying on ChanCMS for content management, especially those handling sensitive or regulated data, may face compliance risks if sensitive information is exposed. Additionally, attackers could leverage disclosed information to target critical infrastructure or business processes, impacting operational security.

Mitigation Recommendations

Organizations should immediately verify their ChanCMS version and upgrade to version 3.1.3 or later, where the vulnerability is patched. Beyond upgrading, it is advisable to audit access controls around the /sysApp/find endpoint to restrict access to trusted IP addresses or authenticated users only. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious requests manipulating accessKey or secretKey parameters can provide additional protection. Regularly monitoring logs for unusual access patterns to the affected endpoint can help detect exploitation attempts early. If upgrading is temporarily not feasible, consider disabling or restricting the vulnerable functionality until a patch can be applied. Finally, review and rotate any potentially exposed credentials or keys to mitigate risks from prior information disclosure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-26T13:05:42.685Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6885e7adad5a09ad00711156

Added to database: 7/27/2025, 8:47:41 AM

Last enriched: 8/4/2025, 12:59:00 AM

Last updated: 9/8/2025, 6:44:10 PM

Views: 36

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats