CVE-2025-9398
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-25

Last updated on: 2025-12-11

Assigner: VulDB

Description
A security vulnerability has been detected in YiFang CMS up to 2.0.5. Affected by this vulnerability is the function exportInstallTable of the file app/utils/base/database/Migrate.php. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-25
Last Modified
2025-12-11
Generated
2026-05-07
AI Q&A
2025-08-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wanglongcn yifang to 2.0.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-9398 is an information disclosure vulnerability in YiFang CMS versions up to 2.0.5. It affects the function exportInstallTable in the file app/utils/base/database/Migrate.php. An attacker can remotely exploit this vulnerability without any authentication to access and leak sensitive database information that should not be accessible. The vulnerability arises from manipulation of an input parameter in the exportInstallTable function, allowing unauthorized exposure of sensitive data. [1, 2]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive database information, impacting the confidentiality of your data. Since it can be exploited remotely without authentication, attackers can easily retrieve sensitive information, which may lead to further attacks or data breaches. There are no patches or countermeasures provided by the vendor, increasing the risk if the vulnerable software is used. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of the vulnerable file path and attempting to access it remotely without authentication. One method is to use Google dorking with the query `inurl:app/utils/base/database/Migrate.php` to identify exposed instances. On your system or network, you can use curl or wget commands to test if the vulnerable endpoint is accessible and discloses information. For example, running `curl http://target-site/app/utils/base/database/Migrate.php` may reveal sensitive data if the system is vulnerable. [2]


What immediate steps should I take to mitigate this vulnerability?

Since no patches or countermeasures have been provided by the vendor, the immediate recommended step is to replace YiFang CMS with an alternative product to avoid the risk. Additionally, restricting access to the vulnerable file path via network controls such as firewall rules or web server configuration to block unauthorized remote access may help mitigate exposure until a permanent fix or replacement is implemented. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart