CVE-2025-56815

Datart 1.0.0-rc.3 is vulnerable to Directory Traversal in the POST /viz/image interface, since the server directly uses MultipartFile.transferTo() to save the uploaded file to a path controllable by the user, and lacks strict verification of the file name.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:running-elephant:datart:1.0.0:rc3:*:*:*:*:*:*

History

10 Oct 2025, 21:07

Type Values Removed Values Added
CPE cpe:2.3:a:running-elephant:datart:1.0.0:rc3:*:*:*:*:*:*
First Time Running-elephant datart
Running-elephant
References () https://github.com/running-elephant/datart/tags - () https://github.com/running-elephant/datart/tags - Release Notes
References () https://github.com/xiaoxiaoranxxx/CVE-2025-56815 - () https://github.com/xiaoxiaoranxxx/CVE-2025-56815 - Exploit, Third Party Advisory

24 Sep 2025, 18:15

Type Values Removed Values Added
CWE CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

24 Sep 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-24 17:15

Updated : 2025-10-10 21:07


NVD link : CVE-2025-56815

Mitre link : CVE-2025-56815

CVE.ORG link : CVE-2025-56815


JSON object : View

Products Affected

running-elephant

  • datart
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')