A vulnerability was detected in baowzh hfly up to 638ff9abe9078bc977c132b37acbe1900b63491c. The impacted element is an unknown function of the file /Public/Kindeditor/php/upload_json.php. Performing manipulation of the argument imgFile results in unrestricted upload. It is possible to initiate the attack remotely. The exploit is now public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/PHP-based%20travel%20website-CMS/PHP-based%20travel%20website-CMS%20upload_json.php%20imgFile%20XSS-File-Upload.md | Broken Link |
| https://vuldb.com/?ctiid.335860 | Permissions Required VDB Entry |
| https://vuldb.com/?id.335860 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.702950 | Third Party Advisory VDB Entry |
Configurations
History
09 Jan 2026, 01:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/PHP-based%20travel%20website-CMS/PHP-based%20travel%20website-CMS%20upload_json.php%20imgFile%20XSS-File-Upload.md - Broken Link | |
| References | () https://vuldb.com/?ctiid.335860 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.335860 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.702950 - Third Party Advisory, VDB Entry | |
| First Time |
Baowzh hfly
Baowzh |
|
| CPE | cpe:2.3:a:baowzh:hfly:*:*:*:*:*:*:*:* |
11 Dec 2025, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 16:16
Updated : 2026-01-09 01:50
NVD link : CVE-2025-14522
Mitre link : CVE-2025-14522
CVE.ORG link : CVE-2025-14522
JSON object : View
Products Affected
baowzh
- hfly
