CVE-2025-7452
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-11

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in kone-net go-chat up to f9e58d0afa9bbdb31faf25e7739da330692c4c63. It has been declared as critical. This vulnerability affects the function GetFile of the file go-chat/api/v1/file_controller.go of the component Endpoint. The manipulation of the argument fileName leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-11
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-07-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
kone-net go-chat *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a path traversal issue in the GetFile function of the go-chat/api/v1/file_controller.go component in kone-net go-chat. By manipulating the fileName argument, an attacker can access files outside the intended directory. The attack can be performed remotely and the exploit has been publicly disclosed.


How can this vulnerability impact me? :

The vulnerability allows remote attackers to access unauthorized files on the system by exploiting the path traversal flaw. This can lead to exposure of sensitive information, potential data breaches, and compromise of system integrity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart