CVE-2025-8516: Path Traversal in Kingdee Cloud-Starry-Sky Enterprise Edition
A security vulnerability has been detected in Kingdee Cloud-Starry-Sky Enterprise Edition up to 8.2. This issue affects the function BaseServiceFactory.getFileUploadService.deleteFileAction of the file K3Cloud\BBCMallSite\WEB-INF\lib\Kingdee.K3.O2O.Base.WebApp.jar!\kingdee\k3\o2o\base\webapp\action\FileUploadAction.class of the component IIS-K3CloudMiniApp. The manipulation of the argument filePath leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. It is suggested to install a patch to address this issue. The vendor recommends as a short-term measure to "[t]emporarily disable external network access to the Kingdee Cloud Galaxy Retail System or set up an IP whitelist for access control." The long-term remediation will be: "Install the security patch provided by the Starry Sky system, with the specific solutions being: i) Adding authentication to the vulnerable CMKAppWebHandler.ashx interface; ii) Removing the file reading function."
AI Analysis
Technical Summary
CVE-2025-8516 is a path traversal vulnerability identified in Kingdee Cloud-Starry-Sky Enterprise Edition up to version 8.2, specifically within the BaseServiceFactory.getFileUploadService.deleteFileAction function of the IIS-K3CloudMiniApp component. The vulnerability arises from improper validation of the filePath parameter, which an attacker can manipulate to traverse directories and access files outside the intended directory scope. This flaw exists in the FileUploadAction.class file inside the Kingdee.K3.O2O.Base.WebApp.jar library. Exploitation is possible remotely without requiring authentication or user interaction, making it a significant risk. The vulnerability could allow attackers to read sensitive files on the server, potentially exposing confidential information or configuration files, which could facilitate further attacks. The vendor has publicly disclosed the issue and recommends immediate mitigation by disabling external network access or implementing IP whitelisting to restrict access to the Kingdee Cloud Galaxy Retail System. The long-term fix involves installing a security patch that adds authentication to the vulnerable CMKAppWebHandler.ashx interface and removes the file reading functionality to eliminate the attack vector. The CVSS 4.0 base score of 6.9 reflects a medium severity level, considering the network attack vector, lack of required privileges, and the potential confidentiality impact. No known exploits are currently reported in the wild, but public disclosure increases the risk of exploitation attempts.
Potential Impact
For European organizations using Kingdee Cloud-Starry-Sky Enterprise Edition, this vulnerability poses a risk of unauthorized file access, potentially exposing sensitive corporate data, intellectual property, or credentials stored on the affected servers. Such exposure could lead to further compromise, including lateral movement within networks or data exfiltration. Retail and enterprise sectors relying on Kingdee's software for cloud-based operations may face operational disruptions or reputational damage if exploited. The ability to exploit remotely without authentication increases the threat level, especially for organizations with externally accessible deployments. Data protection regulations such as GDPR heighten the consequences of data breaches resulting from this vulnerability, potentially leading to regulatory penalties and loss of customer trust. The medium severity rating suggests a moderate but actionable risk, emphasizing the need for timely remediation to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
European organizations should immediately implement the vendor's short-term recommendations by disabling external network access to the Kingdee Cloud Galaxy Retail System or configuring strict IP whitelisting to limit access only to trusted internal or partner networks. Network segmentation should be enforced to isolate the affected systems from the broader enterprise environment. Monitoring and logging access to the vulnerable service should be enhanced to detect suspicious activity indicative of exploitation attempts. Organizations should prioritize applying the official security patch from Kingdee as soon as it becomes available, which includes adding authentication to the CMKAppWebHandler.ashx interface and removing the file reading functionality that enables path traversal. Additionally, conduct a thorough audit of affected systems to identify any signs of compromise. Implementing web application firewalls (WAFs) with custom rules to block path traversal patterns targeting the vulnerable endpoints can provide an additional protective layer. Finally, ensure regular backups of critical data and verify restoration procedures to mitigate potential damage from exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-8516: Path Traversal in Kingdee Cloud-Starry-Sky Enterprise Edition
Description
A security vulnerability has been detected in Kingdee Cloud-Starry-Sky Enterprise Edition up to 8.2. This issue affects the function BaseServiceFactory.getFileUploadService.deleteFileAction of the file K3Cloud\BBCMallSite\WEB-INF\lib\Kingdee.K3.O2O.Base.WebApp.jar!\kingdee\k3\o2o\base\webapp\action\FileUploadAction.class of the component IIS-K3CloudMiniApp. The manipulation of the argument filePath leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. It is suggested to install a patch to address this issue. The vendor recommends as a short-term measure to "[t]emporarily disable external network access to the Kingdee Cloud Galaxy Retail System or set up an IP whitelist for access control." The long-term remediation will be: "Install the security patch provided by the Starry Sky system, with the specific solutions being: i) Adding authentication to the vulnerable CMKAppWebHandler.ashx interface; ii) Removing the file reading function."
AI-Powered Analysis
Technical Analysis
CVE-2025-8516 is a path traversal vulnerability identified in Kingdee Cloud-Starry-Sky Enterprise Edition up to version 8.2, specifically within the BaseServiceFactory.getFileUploadService.deleteFileAction function of the IIS-K3CloudMiniApp component. The vulnerability arises from improper validation of the filePath parameter, which an attacker can manipulate to traverse directories and access files outside the intended directory scope. This flaw exists in the FileUploadAction.class file inside the Kingdee.K3.O2O.Base.WebApp.jar library. Exploitation is possible remotely without requiring authentication or user interaction, making it a significant risk. The vulnerability could allow attackers to read sensitive files on the server, potentially exposing confidential information or configuration files, which could facilitate further attacks. The vendor has publicly disclosed the issue and recommends immediate mitigation by disabling external network access or implementing IP whitelisting to restrict access to the Kingdee Cloud Galaxy Retail System. The long-term fix involves installing a security patch that adds authentication to the vulnerable CMKAppWebHandler.ashx interface and removes the file reading functionality to eliminate the attack vector. The CVSS 4.0 base score of 6.9 reflects a medium severity level, considering the network attack vector, lack of required privileges, and the potential confidentiality impact. No known exploits are currently reported in the wild, but public disclosure increases the risk of exploitation attempts.
Potential Impact
For European organizations using Kingdee Cloud-Starry-Sky Enterprise Edition, this vulnerability poses a risk of unauthorized file access, potentially exposing sensitive corporate data, intellectual property, or credentials stored on the affected servers. Such exposure could lead to further compromise, including lateral movement within networks or data exfiltration. Retail and enterprise sectors relying on Kingdee's software for cloud-based operations may face operational disruptions or reputational damage if exploited. The ability to exploit remotely without authentication increases the threat level, especially for organizations with externally accessible deployments. Data protection regulations such as GDPR heighten the consequences of data breaches resulting from this vulnerability, potentially leading to regulatory penalties and loss of customer trust. The medium severity rating suggests a moderate but actionable risk, emphasizing the need for timely remediation to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
European organizations should immediately implement the vendor's short-term recommendations by disabling external network access to the Kingdee Cloud Galaxy Retail System or configuring strict IP whitelisting to limit access only to trusted internal or partner networks. Network segmentation should be enforced to isolate the affected systems from the broader enterprise environment. Monitoring and logging access to the vulnerable service should be enhanced to detect suspicious activity indicative of exploitation attempts. Organizations should prioritize applying the official security patch from Kingdee as soon as it becomes available, which includes adding authentication to the CMKAppWebHandler.ashx interface and removing the file reading functionality that enables path traversal. Additionally, conduct a thorough audit of affected systems to identify any signs of compromise. Implementing web application firewalls (WAFs) with custom rules to block path traversal patterns targeting the vulnerable endpoints can provide an additional protective layer. Finally, ensure regular backups of critical data and verify restoration procedures to mitigate potential damage from exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-04T05:57:31.166Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6890d61aad5a09ad00e21575
Added to database: 8/4/2025, 3:47:38 PM
Last enriched: 11/3/2025, 7:09:00 AM
Last updated: 11/3/2025, 10:02:28 AM
Views: 150
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
3rd November – Threat Intelligence Report
MediumBreaking Down 8 Open Source AI Security Tools at Black Hat Europe 2025 Arsenal
MediumCVE-2025-48397: CWE-306 Missing Authentication for Critical Function in Eaton Eaton Brightlayer Software Suite (BLSS)
HighCVE-2025-48396: CWE-434 Unrestricted Upload of File with Dangerous Type in Eaton Eaton Brightlayer Software Suite (BLSS)
HighCVE-2025-12623: Authorization Bypass in fushengqian fuint
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.