CVE-2025-11337
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-06

Last updated on: 2025-10-06

Assigner: VulDB

Description
A vulnerability was detected in Four-Faith Water Conservancy Informatization Platform up to 2.2. This affects an unknown part of the file /aloneReport/index.do/../../aloneReport/download.do;othersusrlogout.do. Performing manipulation of the argument fileName results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-06
Last Modified
2025-10-06
Generated
2026-05-07
AI Q&A
2025-10-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
four-faith water_conservancy_informatization_platform 2.2
four-faith water_conservancy_informatization_platform 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-11337 is a path traversal vulnerability in the Four-Faith Water Conservancy Informatization Platform up to version 2.2. It exists in the handling of the 'fileName' parameter in the '/aloneReport/index.do/../../aloneReport/download.do;othersusrlogout.do' endpoint. Due to insufficient input validation, attackers can manipulate this parameter to traverse directories and read arbitrary files on the server without authentication. This allows unauthorized access to sensitive files, such as configuration files, by crafting specific requests remotely. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to read sensitive files on the affected server without any authentication. This compromises the confidentiality of data, potentially exposing sensitive configuration files or other critical information. Since the exploit is publicly available and easy to execute remotely, it increases the risk of unauthorized data disclosure and may lead to further attacks or system compromise. [1, 2, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability can negatively affect compliance with standards and regulations such as GDPR and HIPAA because it exposes sensitive data through unauthorized file access, violating data confidentiality requirements. Organizations using the affected platform may fail to protect personal or sensitive information adequately, leading to potential legal and regulatory consequences. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending crafted HTTP GET requests to the vulnerable endpoint to test for path traversal. For example, you can use a command like: curl -v "http://<target-server>/aloneReport/index.do/../../aloneReport/download.do;othersusrlogout.do?fileName=../WEB-INF/classes/web.properties" to check if the server returns the contents of a sensitive file. A successful response indicates the vulnerability is present. [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing strict input validation on the 'fileName' parameter to prevent path traversal, enforcing file access controls to restrict unauthorized file reads, and conducting thorough security audits. Since no official patches or vendor responses are available, replacing the affected product with a secure alternative is recommended. Monitoring and blocking suspicious requests targeting the vulnerable endpoints can also help reduce risk. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart