CVE-2025-7628

A vulnerability was found in YiJiuSmile kkFileViewOfficeEdit up to 5fbc57c48e8fe6c1b91e0e7995e2d59615f37abd. It has been classified as critical. This affects the function deleteFile of the file /deleteFile. The manipulation of the argument fileName leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
References
Link Resource
https://github.com/YiJiuSmile/kkFileViewOfficeEdit/issues/15 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.316329 Permissions Required VDB Entry
https://vuldb.com/?id.316329 Third Party Advisory VDB Entry
https://vuldb.com/?submit.609098 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:yijiusmile:kkfileviewofficeedit:*:*:*:*:*:*:*:*

History

07 Nov 2025, 19:21

Type Values Removed Values Added
First Time Yijiusmile
Yijiusmile kkfileviewofficeedit
CPE cpe:2.3:a:yijiusmile:kkfileviewofficeedit:*:*:*:*:*:*:*:*
References () https://github.com/YiJiuSmile/kkFileViewOfficeEdit/issues/15 - () https://github.com/YiJiuSmile/kkFileViewOfficeEdit/issues/15 - Exploit, Issue Tracking, Vendor Advisory
References () https://vuldb.com/?ctiid.316329 - () https://vuldb.com/?ctiid.316329 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.316329 - () https://vuldb.com/?id.316329 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.609098 - () https://vuldb.com/?submit.609098 - Third Party Advisory, VDB Entry

15 Jul 2025, 13:14

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en YiJiuSmile kkFileViewOfficeEdit hasta 5fbc57c48e8fe6c1b91e0e7995e2d59615f37abd. Se ha clasificado como crítica. Afecta a la función deleteFile del archivo /deleteFile. La manipulación del argumento fileName provoca un path traversal. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Este producto utiliza el enfoque de lanzamiento continuo para garantizar una distribución continua. Por lo tanto, no se dispone de información sobre las versiones afectadas ni sobre las actualizadas.

14 Jul 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-14 18:15

Updated : 2025-11-07 19:21


NVD link : CVE-2025-7628

Mitre link : CVE-2025-7628

CVE.ORG link : CVE-2025-7628


JSON object : View

Products Affected

yijiusmile

  • kkfileviewofficeedit
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')