We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-4178

xiaowei1118 java_server File Upload API FoodController.java path traversal



Description

EN DE

A vulnerability was found in xiaowei1118 java_server up to 11a5bac8f4ba1c17e4bc1b27cad6d24868500e3a on Windows and classified as critical. This issue affects some unknown processing of the file /src/main/java/com/changyu/foryou/controller/FoodController.java of the component File Upload API. The manipulation leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.

Eine kritische Schwachstelle wurde in xiaowei1118 java_server bis 11a5bac8f4ba1c17e4bc1b27cad6d24868500e3a für Windows gefunden. Dies betrifft einen unbekannten Teil der Datei /src/main/java/com/changyu/foryou/controller/FoodController.java der Komponente File Upload API. Durch das Manipulieren mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. Dieses Produkt setzt Rolling Releases ein. Aus diesem Grund sind Details zu betroffenen oder zu aktualisierende Versionen nicht verfügbar.

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-02 | Assigner VulDB


MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
MEDIUM: 5.4CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
5.5AV:N/AC:L/Au:S/C:N/I:P/A:P

Problem types

Path Traversal

Product status

11a5bac8f4ba1c17e4bc1b27cad6d24868500e3a
affected

Timeline

2025-05-01:Advisory disclosed
2025-05-01:VulDB entry created
2025-05-01:VulDB entry last update

Credits

ShenxiuSecurity (VulDB User) reporter

References

vuldb.com/?id.306797 (VDB-306797 | xiaowei1118 java_server File Upload API FoodController.java path traversal) vdb-entry

vuldb.com/?ctiid.306797 (VDB-306797 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.561794 (Submit #561794 | xiaowei1118 java_server master branch Path Traversal) third-party-advisory

github.com/...xiuSec/cve-proofs/blob/main/POC-20250418-02.md exploit

cve.org (CVE-2025-4178)

nvd.nist.gov (CVE-2025-4178)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-4178

Support options

Helpdesk Chat, Email, Knowledgebase