Home

Description

A flaw has been found in ZenTao up to 21.7.6-8564. The affected element is the function file::delete of the file module/file/control.php of the component File Handler. Executing manipulation of the argument fileID can lead to improper privilege management. It is possible to launch the attack remotely. Upgrading to version 21.7.7 is sufficient to fix this issue. You should upgrade the affected component.

PUBLISHED Reserved 2025-11-29 | Published 2025-11-30 | Updated 2025-12-01 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X
MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:X/RL:O/RC:C
MEDIUM: 5.4CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:X/RL:O/RC:C
5.5AV:N/AC:L/Au:S/C:N/I:P/A:P/E:ND/RL:OF/RC:C

Problem types

Improper Privilege Management

Incorrect Privilege Assignment

Timeline

2025-11-29:Advisory disclosed
2025-11-29:VulDB entry created
2025-11-29:VulDB entry last update

Credits

ez-lbz (VulDB User) reporter

References

github.com/ez-lbz/ez-lbz.github.io/issues/1 exploit

github.com/ez-lbz/ez-lbz.github.io/issues/1 exploit

vuldb.com/?id.333791 (VDB-333791 | ZenTao File control.php delete privileges management) vdb-entry technical-description

vuldb.com/?ctiid.333791 (VDB-333791 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.689892 (Submit #689892 | Zentao PMS <=21.7.6-85642 Privilege Escalation) third-party-advisory

github.com/ez-lbz/ez-lbz.github.io/issues/1 issue-tracking

github.com/ez-lbz/ez-lbz.github.io/issues/1 issue-tracking

www.zentao.net/extension-buyext-1601-download.html patch

cve.org (CVE-2025-13787)

nvd.nist.gov (CVE-2025-13787)

Download JSON