CVE-2025-9639
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-29

Last updated on: 2025-08-29

Assigner: TWCERT/CC

Description
The QbiCRMGateway developed by Ai3 has an Arbitrary File Reading vulnerability, allowing unauthenticated remote attackers to exploit Relative Path Traversal to download arbitrary system files.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-29
Last Modified
2025-08-29
Generated
2026-05-06
AI Q&A
2025-08-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
ai3 qbicrmgateway 8.5.03
ai3 qbicrmgateway 7.5.1
ai3 qbicrmgateway 8.5.04
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-23 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-9639 is an Arbitrary File Reading vulnerability in Ai3's QbiCRMGateway (versions 7.5.1 through 8.5.03). It arises from a Relative Path Traversal flaw that allows unauthenticated remote attackers to download arbitrary system files without needing to verify their identity. [1, 2]


How can this vulnerability impact me? :

This vulnerability impacts the confidentiality of the affected system by allowing attackers to access sensitive system files remotely without authentication. It does not affect the integrity or availability of the system. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should update QbiCRMGateway to version 8.5.04 or later, or apply the provided patch for the vulnerability. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart