Vulnerability Description
A vulnerability classified as problematic has been found in enilu web-flash 1.0. This affects the function fileService.upload of the file src/main/java/cn/enilu/flash/api/controller/FileController/upload of the component File Upload. The manipulation of the argument File leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Enilu | Web-Flash | 1.0 |
Related Weaknesses (CWE)
References
- https://gitee.com/enilu/web-flash/issues/ICAXTMExploitIssue Tracking
- https://vuldb.com/?ctiid.310959Permissions RequiredVDB Entry
- https://vuldb.com/?id.310959Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.585342Third Party AdvisoryVDB Entry
- https://gitee.com/enilu/web-flash/issues/ICAXTMExploitIssue Tracking
FAQ
What is CVE-2025-5523?
CVE-2025-5523 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability classified as problematic has been found in enilu web-flash 1.0. This affects the function fileService.upload of the file src/main/java/cn/enilu/flash/api/controller/FileController/upl...
How severe is CVE-2025-5523?
CVE-2025-5523 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-5523?
Check the references section above for vendor advisories and patch information. Affected products include: Enilu Web-Flash.