Vulnerability Description
A vulnerability classified as critical has been found in quequnlong shiyi-blog up to 1.2.1. This affects an unknown part of the file /api/file/upload. The manipulation of the argument file/source leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Quequnlong | Shiyi-Blog | <= 1.2.1 |
Related Weaknesses (CWE)
References
- https://github.com/uglory-gll/javasec/blob/main/shiyi-blog.mdExploit
- https://github.com/uglory-gll/javasec/blob/main/shiyi-blog.md#1file-path-traversExploit
- https://vuldb.com/?ctiid.310923Permissions RequiredVDB Entry
- https://vuldb.com/?id.310923Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.584488Third Party AdvisoryVDB Entry
- https://github.com/uglory-gll/javasec/blob/main/shiyi-blog.mdExploit
FAQ
What is CVE-2025-5509?
CVE-2025-5509 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability classified as critical has been found in quequnlong shiyi-blog up to 1.2.1. This affects an unknown part of the file /api/file/upload. The manipulation of the argument file/source lead...
How severe is CVE-2025-5509?
CVE-2025-5509 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-5509?
Check the references section above for vendor advisories and patch information. Affected products include: Quequnlong Shiyi-Blog.