Warehouse Management System 1.2 contains an authenticated arbitrary file deletion vulnerability. The /goods/deleteGoods endpoint accepts a user-controlled goodsimg parameter, which is directly concatenated with the server's UPLOAD_PATH and passed to File.delete() without validation. A remote authenticated attacker can delete arbitrary files on the server by supplying directory traversal payloads.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/W000i/vuln/issues/3 |
|
History
Fri, 12 Dec 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yeqifu
Yeqifu warehouse Management System |
|
| CPEs | cpe:2.3:a:yeqifu:warehouse_management_system:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yeqifu
Yeqifu warehouse Management System |
Fri, 05 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
Fri, 05 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Warehouse Management System 1.2 contains an authenticated arbitrary file deletion vulnerability. The /goods/deleteGoods endpoint accepts a user-controlled goodsimg parameter, which is directly concatenated with the server's UPLOAD_PATH and passed to File.delete() without validation. A remote authenticated attacker can delete arbitrary files on the server by supplying directory traversal payloads. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-05T00:00:00.000Z
Updated: 2025-12-05T20:03:40.432Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65879
Updated: 2025-12-05T20:02:37.726Z
Status : Analyzed
Published: 2025-12-05T17:16:04.093
Modified: 2025-12-12T12:51:37.257
Link: CVE-2025-65879
No data.