Vulnerability Description
A vulnerability was found in Seeyon Zhiyuan OA Web Application System 8.1 SP2. It has been classified as problematic. Affected is the function Download of the file seeyon\opt\Seeyon\A8\ApacheJetspeed\webapps\seeyon\WEB-INF\lib\seeyon-apps-m3.jar!\com\seeyon\apps\m3\core\controller\M3CoreController.class of the component ZIP File Handler. The manipulation of the argument Name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Seeyon | Oa Web Application System | 8.1 |
Related Weaknesses (CWE)
References
- https://vuldb.com/?ctiid.308274Permissions RequiredVDB Entry
- https://vuldb.com/?id.308274Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.565379Third Party AdvisoryVDB Entry
- https://wx.mail.qq.com/s?k=h3jd6HR4UnUJxQZ0RGBroken Link
FAQ
What is CVE-2025-4529?
CVE-2025-4529 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A vulnerability was found in Seeyon Zhiyuan OA Web Application System 8.1 SP2. It has been classified as problematic. Affected is the function Download of the file seeyon\opt\Seeyon\A8\ApacheJetspeed\...
How severe is CVE-2025-4529?
CVE-2025-4529 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-4529?
Check the references section above for vendor advisories and patch information. Affected products include: Seeyon Oa Web Application System.