{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-5381","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-05-30T12:30:07.011Z","datePublished":"2025-05-31T14:31:10.103Z","dateUpdated":"2025-06-02T15:47:39.708Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-05-31T14:31:10.103Z"},"title":"Yifang CMS Admin Panel downloadFile path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"Yifang","product":"CMS","versions":[{"version":"2.0.0","status":"affected"},{"version":"2.0.1","status":"affected"},{"version":"2.0.2","status":"affected"}],"modules":["Admin Panel"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in Yifang CMS up to 2.0.2. Affected is the function downloadFile of the file /api/File/downloadFile of the component Admin Panel. The manipulation of the argument File leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Es wurde eine Schwachstelle in Yifang CMS bis 2.0.2 gefunden. Sie wurde als problematisch eingestuft. Betroffen hiervon ist die Funktion downloadFile der Datei /api/File/downloadFile der Komponente Admin Panel. Dank Manipulation des Arguments File mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":2.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:P/I:N/A:N"}}],"timeline":[{"time":"2025-05-30T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-05-30T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-05-30T14:35:10.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB Gitee Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.310674","name":"VDB-310674 | Yifang CMS Admin Panel downloadFile path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.310674","name":"VDB-310674 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://gitee.com/wanglongcn/yifang/issues/IC0RCX","tags":["exploit","issue-tracking"]}]},"adp":[{"references":[{"url":"https://gitee.com/wanglongcn/yifang/issues/IC0RCX","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-02T15:26:04.530073Z","id":"CVE-2025-5381","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-02T15:47:39.708Z"}}]}}