CVE-2025-8516
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-04

Last updated on: 2025-11-03

Assigner: VulDB

Description
A security vulnerability has been detected in Kingdee Cloud-Starry-Sky Enterprise Edition up to 8.2. This issue affects the function BaseServiceFactory.getFileUploadService.deleteFileAction of the file K3Cloud\BBCMallSite\WEB-INF\lib\Kingdee.K3.O2O.Base.WebApp.jar!\kingdee\k3\o2o\base\webapp\action\FileUploadAction.class of the component IIS-K3CloudMiniApp. The manipulation of the argument filePath leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. It is suggested to install a patch to address this issue. The vendor recommends as a short-term measure to "[t]emporarily disable external network access to the Kingdee Cloud Galaxy Retail System or set up an IP whitelist for access control." The long-term remediation will be: "Install the security patch provided by the Starry Sky system, with the specific solutions being: i) Adding authentication to the vulnerable CMKAppWebHandler.ashx interface; ii) Removing the file reading function."
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-04
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-08-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
kingdee cloud-starry-sky_enterprise_edition 8.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-8516 is a path traversal vulnerability in Kingdee Cloud-Starry-Sky Enterprise Edition up to version 8.2. It occurs in the IIS-K3CloudMiniApp component, specifically in the function BaseServiceFactory.getFileUploadService.deleteFileAction. The vulnerability arises because the application improperly handles the filePath argument, allowing an attacker to manipulate the path to access files or directories outside the intended restricted directory. This can be exploited remotely without authentication, enabling unauthorized access to sensitive files. [1, 2]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to remotely access sensitive files on your system without authentication. This unauthorized access can lead to the exposure of confidential information, potentially causing data leakage and compromising system confidentiality. The exploit is publicly available and considered easy to execute, increasing the risk of exploitation. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can involve monitoring for unusual or unauthorized access attempts to the vulnerable function or interface, especially requests containing path traversal patterns such as '../' or '..\'. Network traffic to the Kingdee Cloud Galaxy Retail System should be inspected for such suspicious payloads. Additionally, checking logs for access to unexpected file paths or errors related to file access can help identify exploitation attempts. Specific commands are not provided in the resources, but general approaches include using web server log analysis tools or intrusion detection systems configured to detect path traversal patterns. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling external network access to the Kingdee Cloud Galaxy Retail System or setting up an IP whitelist to restrict access. Applying restrictive firewall rules to limit exposure is also recommended. Additionally, implementing strict filtering of user-supplied path parameters to block traversal characters (e.g., ../, ..\, and their encoded variants) can help prevent exploitation. Minimizing file permissions for the web application and enforcing whitelist verification mechanisms for accessible file paths are also advised as short-term countermeasures until the security patch is applied. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart