CVE-2025-12923
BaseFortify
Publication date: 2025-11-10
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| 1000mz | chestnutcms | to 1.5.8 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability allows an attacker to remotely perform path traversal, which can lead to unauthorized access to files on the server. This could expose sensitive information or system files, potentially compromising the security of the affected system.
Can you explain this vulnerability to me?
This vulnerability exists in liweiyi ChestnutCMS up to version 1.5.8, specifically in the resourceDownload function of the /dev-api/common/download file. By manipulating the 'path' argument, an attacker can perform a path traversal attack, potentially accessing files outside the intended directory. The attack can be executed remotely and the exploit has been publicly disclosed.