Home

Description

EN DE

A vulnerability was determined in liweiyi ChestnutCMS up to 1.5.8. This vulnerability affects the function resourceDownload of the file /dev-api/common/download. Executing manipulation of the argument path can lead to path traversal. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

In liweiyi ChestnutCMS up to 1.5.8 ist eine Schwachstelle entdeckt worden. Es geht hierbei um die Funktion resourceDownload der Datei /dev-api/common/download. Die Manipulation des Arguments path führt zu path traversal. Der Angriff kann über das Netzwerk erfolgen. Der Exploit ist öffentlich verfügbar und könnte genutzt werden.

PUBLISHED Reserved 2025-11-09 | Published 2025-11-10 | Updated 2025-11-10 | Assigner VulDB




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 2.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
LOW: 2.7CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
3.3AV:N/AC:L/Au:M/C:P/I:N/A:N/E:POC/RL:ND/RC:UR

Problem types

Path Traversal

Product status

1.5.0
affected

1.5.1
affected

1.5.2
affected

1.5.3
affected

1.5.4
affected

1.5.5
affected

1.5.6
affected

1.5.7
affected

1.5.8
affected

Timeline

2025-11-09:Advisory disclosed
2025-11-09:VulDB entry created
2025-11-09:VulDB entry last update

Credits

Huu1j (VulDB User) reporter

References

vuldb.com/?id.331643 (VDB-331643 | liweiyi ChestnutCMS download resourceDownload path traversal) vdb-entry technical-description

vuldb.com/?ctiid.331643 (VDB-331643 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.681032 (Submit #681032 | liweiyi ChestnutCMS 1.5.8 Path Traversal) third-party-advisory

github.com/...E/blob/main/chestnutcms Arbitrary File Read.md exploit

cve.org (CVE-2025-12923)

nvd.nist.gov (CVE-2025-12923)

Download JSON