CVE-2025-5523

A vulnerability classified as problematic has been found in enilu web-flash 1.0. This affects the function fileService.upload of the file src/main/java/cn/enilu/flash/api/controller/FileController/upload of the component File Upload. The manipulation of the argument File leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Configurations

No configuration.

History

04 Jun 2025, 14:54

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad clasificada como problemática en enilu web-flash 1.0. Esta afecta a la función fileService.upload del archivo src/main/java/cn/enilu/flash/api/controller/FileController/upload del componente File Upload. La manipulación del argumento File provoca ataques de cross site scripting. Es posible iniciar el ataque de forma remota. Se ha hecho público el exploit y puede que sea utilizado.

03 Jun 2025, 21:15

Type Values Removed Values Added
References () https://gitee.com/enilu/web-flash/issues/ICAXTM - () https://gitee.com/enilu/web-flash/issues/ICAXTM -

03 Jun 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-03 20:15

Updated : 2025-06-04 14:54


NVD link : CVE-2025-5523

Mitre link : CVE-2025-5523

CVE.ORG link : CVE-2025-5523


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')