Home

Description

Warehouse Management System 1.2 contains an authenticated arbitrary file deletion vulnerability. The /goods/deleteGoods endpoint accepts a user-controlled goodsimg parameter, which is directly concatenated with the server's UPLOAD_PATH and passed to File.delete() without validation. A remote authenticated attacker can delete arbitrary files on the server by supplying directory traversal payloads.

PUBLISHED Reserved 2025-11-18 | Published 2025-12-05 | Updated 2025-12-05 | Assigner mitre

References

github.com/W000i/vuln/issues/3

cve.org (CVE-2025-65879)

nvd.nist.gov (CVE-2025-65879)