CVE-2025-15432

MEDIUM5.5/ 10.0
Share:
Published: January 2, 2026 at 07:15 AM
Modified: January 12, 2026 at 03:32 PM
Source: cna@vuldb.com

Vulnerability Description

A vulnerability has been found in yeqifu carRental up to 3fabb7eae93d209426638863980301d6f99866b3. This vulnerability affects the function downloadShowFile of the file /file/downloadShowFile.action of the component com.yeqifu.sys.controller.FileController. The manipulation of the argument path leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet.

CVSS Metrics

Base Score
5.5
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com

AI Security Analysis

01 // Technical Summary

Critical vulnerability discovered in yeqifu carRental allows for remote path traversal, potentially enabling attackers to access and exfiltrate sensitive files from the server. This unpatched vulnerability poses a significant risk of data breach and system compromise due to the public availability of the exploit and lack of vendor response.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: An attacker crafts a malicious HTTP request to /file/downloadShowFile.action containing a crafted path parameter. This parameter will include path traversal sequences (e.g., ../../../etc/passwd). Step 2: Request Processing: The downloadShowFile function receives the request and extracts the path parameter. Step 3: Path Manipulation (Flawed): The function fails to properly validate or sanitize the path parameter. It directly uses the attacker-controlled path to construct the file path to be accessed. Step 4: File Access: The server attempts to access the file specified by the manipulated path (e.g., /etc/passwd). Step 5: Information Disclosure: The server returns the contents of the requested file (e.g., /etc/passwd) to the attacker, leading to information disclosure.

03 // Deep Technical Analysis

The vulnerability lies within the downloadShowFile function in /file/downloadShowFile.action of the FileController. The function fails to properly sanitize or validate the path argument, allowing an attacker to craft a malicious payload containing path traversal sequences (e.g., ../) to navigate outside the intended directory. This leads to the ability to read arbitrary files on the server, including configuration files, sensitive data, and potentially even system files, depending on the server's file system permissions. The root cause is a lack of input validation and sanitization of the path parameter before it is used to access files. This allows for the manipulation of the file path, leading to unauthorized access.

CVE-2025-15432 - MEDIUM Severity (5.5) | Free CVE Database | 4nuxd