Vulnerability Description
A vulnerability was found in RainyGao DocSys up to 2.02.36. Affected is the function updateRealDoc of the file /Doc/uploadDoc.do of the component File Upload. Performing manipulation of the argument path results in path traversal. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Docsys Project | Docsys | <= 2.02.36 |
Related Weaknesses (CWE)
References
- https://github.com/xkalami-Tta0/CVE/blob/main/DocSys/%E4%BB%BB%E6%84%8F%E6%96%87Exploit
- https://vuldb.com/?ctiid.328042Permissions RequiredVDB Entry
- https://vuldb.com/?id.328042Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.664845Third Party AdvisoryVDB Entry
- https://github.com/xkalami-Tta0/CVE/blob/main/DocSys/%E4%BB%BB%E6%84%8F%E6%96%87Exploit
FAQ
What is CVE-2025-11630?
CVE-2025-11630 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was found in RainyGao DocSys up to 2.02.36. Affected is the function updateRealDoc of the file /Doc/uploadDoc.do of the component File Upload. Performing manipulation of the argument p...
How severe is CVE-2025-11630?
CVE-2025-11630 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-11630?
Check the references section above for vendor advisories and patch information. Affected products include: Docsys Project Docsys.