{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6534","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-06-23T14:32:27.054Z","datePublished":"2025-06-24T00:31:05.097Z","dateUpdated":"2025-06-25T12:43:22.215Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-06-24T00:31:05.097Z"},"title":"xxyopen/201206030 novel-plus File FileController.java remove resource injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-99","lang":"en","description":"Improper Control of Resource Identifiers"}]}],"affected":[{"vendor":"xxyopen","product":"novel-plus","versions":[{"version":"5.1.0","status":"affected"},{"version":"5.1.1","status":"affected"},{"version":"5.1.2","status":"affected"},{"version":"5.1.3","status":"affected"}],"modules":["File Handler"]},{"vendor":"201206030","product":"novel-plus","versions":[{"version":"5.1.0","status":"affected"},{"version":"5.1.1","status":"affected"},{"version":"5.1.2","status":"affected"},{"version":"5.1.3","status":"affected"}],"modules":["File Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in xxyopen/201206030 novel-plus up to 5.1.3. This affects the function remove of the file novel-admin/src/main/java/com/java2nb/common/controller/FileController.java of the component File Handler. The manipulation leads to improper control of resource identifiers. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in xxyopen/201206030 novel-plus bis 5.1.3 gefunden. Dabei betrifft es die Funktion remove der Datei novel-admin/src/main/java/com/java2nb/common/controller/FileController.java der Komponente File Handler. Durch Beeinflussen mit unbekannten Daten kann eine improper control of resource identifiers-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Sie ist schwierig auszunutzen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":2.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"LOW"}},{"cvssV3_1":{"version":"3.1","baseScore":4.2,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.2,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":3.6,"vectorString":"AV:N/AC:H/Au:S/C:N/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-06-23T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-06-23T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-06-23T16:37:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"bpy9ft (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.313653","name":"VDB-313653 | xxyopen/201206030 novel-plus File FileController.java remove resource injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.313653","name":"VDB-313653 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.596505","name":"Submit #596505 | xxyopen novel-plus v5.1.3 Improper Authorization","tags":["third-party-advisory"]},{"url":"https://blog.0xd00.com/blog/missing-authorization-leads-to-arbitrary-file-deletion","tags":["related"]},{"url":"https://blog.0xd00.com/blog/missing-authorization-leads-to-arbitrary-file-deletion#poc","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://blog.0xd00.com/blog/missing-authorization-leads-to-arbitrary-file-deletion","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-25T12:38:49.732977Z","id":"CVE-2025-6534","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-25T12:43:22.215Z"}}]}}