Vulnerability Description
A vulnerability was identified in moxi159753 Mogu Blog v2 up to 5.2. This issue affects some unknown processing of the file /storage/ of the component Storage Management Endpoint. The manipulation leads to missing authorization. The attack can be initiated remotely. The attack's complexity is rated as high. The exploitability is assessed as difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mogublog Project | Mogublog | <= 5.2 |
Related Weaknesses (CWE)
References
- https://github.com/Xzzz111/exps/blob/main/archives/mogu_blog_v2-broken_access_coExploit
- https://github.com/Xzzz111/exps/blob/main/archives/mogu_blog_v2-broken_access_coExploit
- https://vuldb.com/?ctiid.333822Permissions RequiredVDB Entry
- https://vuldb.com/?id.333822Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.692104Third Party AdvisoryVDB Entry
FAQ
What is CVE-2025-13813?
CVE-2025-13813 is a vulnerability with a CVSS score of 5.6 (MEDIUM). A vulnerability was identified in moxi159753 Mogu Blog v2 up to 5.2. This issue affects some unknown processing of the file /storage/ of the component Storage Management Endpoint. The manipulation lea...
How severe is CVE-2025-13813?
CVE-2025-13813 has been rated MEDIUM with a CVSS base score of 5.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-13813?
Check the references section above for vendor advisories and patch information. Affected products include: Mogublog Project Mogublog.