{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15589","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-23T10:37:19.880Z","datePublished":"2026-02-24T05:52:29.889Z","dateUpdated":"2026-02-24T17:24:16.995Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T05:52:29.889Z"},"title":"MuYuCMS Template Management Template.php delete_dir_file path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"n/a","product":"MuYuCMS","versions":[{"version":"2.7","status":"affected"}],"cpes":["cpe:2.3:a:muyucms:muyucms:*:*:*:*:*:*:*:*"],"modules":["Template Management Page"]}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in MuYuCMS 2.7. Affected is the function delete_dir_file of the file application/admin/controller/Template.php of the component Template Management Page. This manipulation of the argument temn/tp causes path traversal. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4.7,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-23T11:42:38.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"b1uel0n3 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.336710","name":"VDB-336710 | MuYuCMS Template Management Template.php delete_dir_file path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.336710","name":"VDB-336710 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.702489","name":"Submit #702489 | MuYuCMS 2.7 Directory Traversal","tags":["third-party-advisory"]},{"url":"https://gist.github.com/b1uel0n3/275ac353537ecf4c8973d33fa0d5b0fe","tags":["related"]},{"url":"https://gist.github.com/b1uel0n3/275ac353537ecf4c8973d33fa0d5b0fe#proof-of-concept","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-24T17:14:29.631001Z","id":"CVE-2025-15589","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-24T17:24:16.995Z"}}]}}