CVE-2025-9398
BaseFortify
Publication date: 2025-08-25
Last updated on: 2025-12-11
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wanglongcn | yifang | to 2.0.5 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-9398 is an information disclosure vulnerability in YiFang CMS versions up to 2.0.5. It affects the function exportInstallTable in the file app/utils/base/database/Migrate.php. An attacker can remotely exploit this vulnerability without any authentication to access and leak sensitive database information that should not be accessible. The vulnerability arises from manipulation of an input parameter in the exportInstallTable function, allowing unauthorized exposure of sensitive data. [1, 2]
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized disclosure of sensitive database information, impacting the confidentiality of your data. Since it can be exploited remotely without authentication, attackers can easily retrieve sensitive information, which may lead to further attacks or data breaches. There are no patches or countermeasures provided by the vendor, increasing the risk if the vulnerable software is used. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of the vulnerable file path and attempting to access it remotely without authentication. One method is to use Google dorking with the query `inurl:app/utils/base/database/Migrate.php` to identify exposed instances. On your system or network, you can use curl or wget commands to test if the vulnerable endpoint is accessible and discloses information. For example, running `curl http://target-site/app/utils/base/database/Migrate.php` may reveal sensitive data if the system is vulnerable. [2]
What immediate steps should I take to mitigate this vulnerability?
Since no patches or countermeasures have been provided by the vendor, the immediate recommended step is to replace YiFang CMS with an alternative product to avoid the risk. Additionally, restricting access to the vulnerable file path via network controls such as firewall rules or web server configuration to block unauthorized remote access may help mitigate exposure until a permanent fix or replacement is implemented. [2]