CVE-2025-8132

A vulnerability was found in yanyutao0402 ChanCMS up to 3.1.2. It has been rated as critical. Affected by this issue is the function delfile of the file app/extend/utils.js. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. The name of the patch is c8a282bf02a62b59ec60b4699e91c51aff2ee9cd. It is recommended to upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:chancms:chancms:*:*:*:*:*:*:*:*

History

27 Aug 2025, 16:25

Type Values Removed Values Added
CPE cpe:2.3:a:chancms:chancms:*:*:*:*:*:*:*:*
First Time Chancms
Chancms chancms
References () https://gitee.com/yanyutao0402/ChanCMS/commit/c8a282bf02a62b59ec60b4699e91c51aff2ee9cd - () https://gitee.com/yanyutao0402/ChanCMS/commit/c8a282bf02a62b59ec60b4699e91c51aff2ee9cd - Permissions Required
References () https://gitee.com/yanyutao0402/ChanCMS/issues/ICLOT8 - () https://gitee.com/yanyutao0402/ChanCMS/issues/ICLOT8 - Exploit, Issue Tracking
References () https://gitee.com/yanyutao0402/ChanCMS/issues/ICLOT8#note_43945209_link - () https://gitee.com/yanyutao0402/ChanCMS/issues/ICLOT8#note_43945209_link - Exploit, Issue Tracking
References () https://gitee.com/yanyutao0402/ChanCMS/releases/tag/V3.1.3 - () https://gitee.com/yanyutao0402/ChanCMS/releases/tag/V3.1.3 - Release Notes
References () https://vuldb.com/?ctiid.317528 - () https://vuldb.com/?ctiid.317528 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.317528 - () https://vuldb.com/?id.317528 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.619776 - () https://vuldb.com/?submit.619776 - Third Party Advisory, VDB Entry
Summary
  • (es) Se encontró una vulnerabilidad en yanyutao0402 ChanCMS hasta la versión 3.1.2. Se ha clasificado como crítica. Este problema afecta a la función "delfile" del archivo app/extend/utils.js. La manipulación provoca un Path traversal. El ataque puede ejecutarse en remoto. El exploit se ha divulgado públicamente y puede utilizarse. Actualizar a la versión 3.1.3 puede solucionar este problema. El parche se llama c8a282bf02a62b59ec60b4699e91c51aff2ee9cd. Se recomienda actualizar el componente afectado.

25 Jul 2025, 12:15

Type Values Removed Values Added
References () https://gitee.com/yanyutao0402/ChanCMS/issues/ICLOT8 - () https://gitee.com/yanyutao0402/ChanCMS/issues/ICLOT8 -
References () https://gitee.com/yanyutao0402/ChanCMS/issues/ICLOT8#note_43945209_link - () https://gitee.com/yanyutao0402/ChanCMS/issues/ICLOT8#note_43945209_link -

25 Jul 2025, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-25 05:15

Updated : 2025-08-27 16:25


NVD link : CVE-2025-8132

Mitre link : CVE-2025-8132

CVE.ORG link : CVE-2025-8132


JSON object : View

Products Affected

chancms

  • chancms
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')