CVE-2025-8226: Information Disclosure in yanyutao0402 ChanCMS
A vulnerability was found in yanyutao0402 ChanCMS up to 3.1.2. It has been classified as problematic. Affected is an unknown function of the file /sysApp/find. The manipulation of the argument accessKey/secretKey leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-8226 is an information disclosure vulnerability affecting yanyutao0402's ChanCMS versions up to 3.1.2. The vulnerability resides in an unspecified function within the /sysApp/find file, where improper handling of the accessKey and secretKey parameters allows an attacker to remotely extract sensitive information. The vulnerability does not require user interaction and can be exploited over the network without authentication, making it accessible to remote attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, meaning low privileges are needed), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. The exploit has been publicly disclosed, increasing the risk of exploitation, although no active exploits in the wild have been reported yet. The vendor has addressed the issue in ChanCMS version 3.1.3, and upgrading to this version or later is recommended to remediate the vulnerability.
Potential Impact
For European organizations using ChanCMS versions 3.1.0 through 3.1.2, this vulnerability poses a risk of unauthorized disclosure of sensitive information, potentially including credentials or configuration data tied to accessKey and secretKey parameters. Such information leakage could facilitate further attacks such as privilege escalation, unauthorized access, or lateral movement within affected systems. The medium severity rating reflects that while the confidentiality impact is low, the ease of remote exploitation without user interaction or high privileges increases the threat. European organizations relying on ChanCMS for content management, especially those handling sensitive or regulated data, may face compliance risks if sensitive information is exposed. Additionally, attackers could leverage disclosed information to target critical infrastructure or business processes, impacting operational security.
Mitigation Recommendations
Organizations should immediately verify their ChanCMS version and upgrade to version 3.1.3 or later, where the vulnerability is patched. Beyond upgrading, it is advisable to audit access controls around the /sysApp/find endpoint to restrict access to trusted IP addresses or authenticated users only. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious requests manipulating accessKey or secretKey parameters can provide additional protection. Regularly monitoring logs for unusual access patterns to the affected endpoint can help detect exploitation attempts early. If upgrading is temporarily not feasible, consider disabling or restricting the vulnerable functionality until a patch can be applied. Finally, review and rotate any potentially exposed credentials or keys to mitigate risks from prior information disclosure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-8226: Information Disclosure in yanyutao0402 ChanCMS
Description
A vulnerability was found in yanyutao0402 ChanCMS up to 3.1.2. It has been classified as problematic. Affected is an unknown function of the file /sysApp/find. The manipulation of the argument accessKey/secretKey leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-8226 is an information disclosure vulnerability affecting yanyutao0402's ChanCMS versions up to 3.1.2. The vulnerability resides in an unspecified function within the /sysApp/find file, where improper handling of the accessKey and secretKey parameters allows an attacker to remotely extract sensitive information. The vulnerability does not require user interaction and can be exploited over the network without authentication, making it accessible to remote attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, meaning low privileges are needed), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. The exploit has been publicly disclosed, increasing the risk of exploitation, although no active exploits in the wild have been reported yet. The vendor has addressed the issue in ChanCMS version 3.1.3, and upgrading to this version or later is recommended to remediate the vulnerability.
Potential Impact
For European organizations using ChanCMS versions 3.1.0 through 3.1.2, this vulnerability poses a risk of unauthorized disclosure of sensitive information, potentially including credentials or configuration data tied to accessKey and secretKey parameters. Such information leakage could facilitate further attacks such as privilege escalation, unauthorized access, or lateral movement within affected systems. The medium severity rating reflects that while the confidentiality impact is low, the ease of remote exploitation without user interaction or high privileges increases the threat. European organizations relying on ChanCMS for content management, especially those handling sensitive or regulated data, may face compliance risks if sensitive information is exposed. Additionally, attackers could leverage disclosed information to target critical infrastructure or business processes, impacting operational security.
Mitigation Recommendations
Organizations should immediately verify their ChanCMS version and upgrade to version 3.1.3 or later, where the vulnerability is patched. Beyond upgrading, it is advisable to audit access controls around the /sysApp/find endpoint to restrict access to trusted IP addresses or authenticated users only. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious requests manipulating accessKey or secretKey parameters can provide additional protection. Regularly monitoring logs for unusual access patterns to the affected endpoint can help detect exploitation attempts early. If upgrading is temporarily not feasible, consider disabling or restricting the vulnerable functionality until a patch can be applied. Finally, review and rotate any potentially exposed credentials or keys to mitigate risks from prior information disclosure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-26T13:05:42.685Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6885e7adad5a09ad00711156
Added to database: 7/27/2025, 8:47:41 AM
Last enriched: 8/4/2025, 12:59:00 AM
Last updated: 9/8/2025, 6:44:10 PM
Views: 36
Related Threats
CVE-2025-6638: CWE-1333 Inefficient Regular Expression Complexity in huggingface huggingface/transformers
MediumCVE-2025-10266: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in NewType Infortech NUP Portal
CriticalCVE-2025-10265: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Digiever DS-1200
CriticalCVE-2025-10264: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Digiever DS-1200
CriticalCVE-2025-21043: CWE-787: Out-of-bounds Write in Samsung Mobile Samsung Mobile Devices
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.