CVE-2025-65878

The warehouse management system version 1.2 contains an arbitrary file read vulnerability. The endpoint `/file/showImageByPath` does not sanitize user-controlled path parameters. An attacker could exploit directory traversal to read arbitrary files on the server's file system. This could lead to the leakage of sensitive system information.
References
Link Resource
https://github.com/W000i/vuln/issues/2 Exploit Third Party Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:yeqifu:warehouse_management_system:1.2:*:*:*:*:*:*:*

History

12 Dec 2025, 12:51

Type Values Removed Values Added
CPE cpe:2.3:a:yeqifu:warehouse_management_system:1.2:*:*:*:*:*:*:*
References () https://github.com/W000i/vuln/issues/2 - () https://github.com/W000i/vuln/issues/2 - Exploit, Third Party Advisory, Issue Tracking
First Time Yeqifu warehouse Management System
Yeqifu

05 Dec 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-22

05 Dec 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-05 17:16

Updated : 2025-12-12 12:51


NVD link : CVE-2025-65878

Mitre link : CVE-2025-65878

CVE.ORG link : CVE-2025-65878


JSON object : View

Products Affected

yeqifu

  • warehouse_management_system
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')