CVE-2025-8516
BaseFortify
Publication date: 2025-08-04
Last updated on: 2025-11-03
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| kingdee | cloud-starry-sky_enterprise_edition | 8.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-8516 is a path traversal vulnerability in Kingdee Cloud-Starry-Sky Enterprise Edition up to version 8.2. It occurs in the IIS-K3CloudMiniApp component, specifically in the function BaseServiceFactory.getFileUploadService.deleteFileAction. The vulnerability arises because the application improperly handles the filePath argument, allowing an attacker to manipulate the path to access files or directories outside the intended restricted directory. This can be exploited remotely without authentication, enabling unauthorized access to sensitive files. [1, 2]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to remotely access sensitive files on your system without authentication. This unauthorized access can lead to the exposure of confidential information, potentially causing data leakage and compromising system confidentiality. The exploit is publicly available and considered easy to execute, increasing the risk of exploitation. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can involve monitoring for unusual or unauthorized access attempts to the vulnerable function or interface, especially requests containing path traversal patterns such as '../' or '..\'. Network traffic to the Kingdee Cloud Galaxy Retail System should be inspected for such suspicious payloads. Additionally, checking logs for access to unexpected file paths or errors related to file access can help identify exploitation attempts. Specific commands are not provided in the resources, but general approaches include using web server log analysis tools or intrusion detection systems configured to detect path traversal patterns. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disabling external network access to the Kingdee Cloud Galaxy Retail System or setting up an IP whitelist to restrict access. Applying restrictive firewall rules to limit exposure is also recommended. Additionally, implementing strict filtering of user-supplied path parameters to block traversal characters (e.g., ../, ..\, and their encoded variants) can help prevent exploitation. Minimizing file permissions for the web application and enforcing whitelist verification mechanisms for accessible file paths are also advised as short-term countermeasures until the security patch is applied. [1, 2]