CVE-2025-65879

Warehouse Management System 1.2 contains an authenticated arbitrary file deletion vulnerability. The /goods/deleteGoods endpoint accepts a user-controlled goodsimg parameter, which is directly concatenated with the server's UPLOAD_PATH and passed to File.delete() without validation. A remote authenticated attacker can delete arbitrary files on the server by supplying directory traversal payloads.
References
Link Resource
https://github.com/W000i/vuln/issues/3 Exploit Third Party Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:yeqifu:warehouse_management_system:*:*:*:*:*:*:*:*

History

12 Dec 2025, 12:51

Type Values Removed Values Added
References () https://github.com/W000i/vuln/issues/3 - () https://github.com/W000i/vuln/issues/3 - Exploit, Third Party Advisory, Issue Tracking
First Time Yeqifu warehouse Management System
Yeqifu
CPE cpe:2.3:a:yeqifu:warehouse_management_system:*:*:*:*:*:*:*:*

05 Dec 2025, 20:15

Type Values Removed Values Added
CWE CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1

05 Dec 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-05 17:16

Updated : 2025-12-12 12:51


NVD link : CVE-2025-65879

Mitre link : CVE-2025-65879

CVE.ORG link : CVE-2025-65879


JSON object : View

Products Affected

yeqifu

  • warehouse_management_system
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')