A weakness has been identified in baowzh hfly up to 638ff9abe9078bc977c132b37acbe1900b63491c. Impacted is an unknown function of the file /admin/index.php/datafile/delfile. This manipulation of the argument filename causes path traversal. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. This product adopts a rolling release strategy to maintain continuous delivery The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/PHP-based%20travel%20website-CMS/PHP-based%20travel%20website-CMS%20delfile%20filename%20Arbitrary%20file%20delete.md | Broken Link |
| https://vuldb.com/?ctiid.335858 | Permissions Required VDB Entry |
| https://vuldb.com/?id.335858 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.702948 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-12-11 16:16
Updated : 2026-01-09 01:58
NVD link : CVE-2025-14520
Mitre link : CVE-2025-14520
CVE.ORG link : CVE-2025-14520
JSON object : View
Products Affected
baowzh
- hfly
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
