CVE-2025-11336
Description
A security vulnerability has been detected in Four-Faith Water Conservancy Informatization Platform up to 2.2. Affected by this issue is some unknown functionality of the file /stAlarmConfigure/index.do/../../aloneReport/download.do;otherlogout.do. Such manipulation of the argument fileName leads to path traversal. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Path traversal vulnerability in Four-Faith Water Conservancy Informatization Platform allows unauthenticated remote attackers to read arbitrary files via crafted requests.
Vulnerability
Overview
A path traversal vulnerability exists in the /stAlarmConfigure/index.do/../../aloneReport/download.do endpoint of the Four-Faith Water Conservancy Informatization Platform (versions up to 2.2). The application fails to properly validate the fileName parameter, allowing directory traversal sequences such as ../ to be processed. This flaw enables an attacker to read arbitrary files on the server, including configuration files and sensitive data.
Exploitation
The attack can be performed remotely without authentication. An attacker simply sends a crafted GET request to the vulnerable endpoint with a fileName parameter containing path traversal sequences. For example, requesting fileName=../WEB-INF/classes/web.properties allows retrieval of the application's configuration file. The vulnerability has been publicly disclosed with a proof-of-concept exploit, increasing the risk of widespread exploitation.
Impact
Successful exploitation grants an attacker the ability to read any file on the server to which the web application has access. This includes sensitive configuration files, credentials, source code, and other proprietary data. The impact is particularly severe as it can lead to further compromise of the system and data exposure.
Mitigation
The vendor (Four-Faith Communication Technology Co., Ltd.) was contacted but did not respond. No official patch or security update has been released. As a temporary measure, administrators should implement strict input validation and file access controls, or consider disabling the vulnerable endpoint until a fix is available [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=2.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.