{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14198","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-06T17:34:31.891Z","datePublished":"2025-12-07T16:32:06.232Z","dateUpdated":"2025-12-08T17:12:34.833Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-12-07T16:32:06.232Z"},"title":"Verysync 微力同步 Web Administration download information disclosure","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-200","lang":"en","description":"Information Disclosure"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"Verysync","product":"微力同步","versions":[{"version":"2.21.3","status":"affected"}],"modules":["Web Administration Module"]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in Verysync 微力同步 2.21.3. This affects an unknown function of the file /safebrowsing/clientreport/download?key=dummytoken of the component Web Administration Module. Performing manipulation results in information disclosure. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-06T18:39:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"jjjjjzr (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.334618","name":"VDB-334618 | Verysync 微力同步 Web Administration download information disclosure","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.334618","name":"VDB-334618 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.699533","name":"Submit #699533 | Beijing Weili Digital Technology Co., Ltd 微力同步 v2.21.3 Download any file","tags":["third-party-advisory"]},{"url":"https://github.com/jjjjj-zr/jjjjjzr/issues/7","tags":["exploit","issue-tracking"]}]},"adp":[{"references":[{"url":"https://github.com/jjjjj-zr/jjjjjzr/issues/7","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-08T17:03:03.743390Z","id":"CVE-2025-14198","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-08T17:12:34.833Z"}}]}}