VYPR
Medium severity5.3NVD Advisory· Published Oct 6, 2025· Updated Apr 15, 2026

CVE-2025-11336

CVE-2025-11336

Description

A security vulnerability has been detected in Four-Faith Water Conservancy Informatization Platform up to 2.2. Affected by this issue is some unknown functionality of the file /stAlarmConfigure/index.do/../../aloneReport/download.do;otherlogout.do. Such manipulation of the argument fileName leads to path traversal. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Path traversal vulnerability in Four-Faith Water Conservancy Informatization Platform allows unauthenticated remote attackers to read arbitrary files via crafted requests.

Vulnerability

Overview

A path traversal vulnerability exists in the /stAlarmConfigure/index.do/../../aloneReport/download.do endpoint of the Four-Faith Water Conservancy Informatization Platform (versions up to 2.2). The application fails to properly validate the fileName parameter, allowing directory traversal sequences such as ../ to be processed. This flaw enables an attacker to read arbitrary files on the server, including configuration files and sensitive data.

Exploitation

The attack can be performed remotely without authentication. An attacker simply sends a crafted GET request to the vulnerable endpoint with a fileName parameter containing path traversal sequences. For example, requesting fileName=../WEB-INF/classes/web.properties allows retrieval of the application's configuration file. The vulnerability has been publicly disclosed with a proof-of-concept exploit, increasing the risk of widespread exploitation.

Impact

Successful exploitation grants an attacker the ability to read any file on the server to which the web application has access. This includes sensitive configuration files, credentials, source code, and other proprietary data. The impact is particularly severe as it can lead to further compromise of the system and data exposure.

Mitigation

The vendor (Four-Faith Communication Technology Co., Ltd.) was contacted but did not respond. No official patch or security update has been released. As a temporary measure, administrators should implement strict input validation and file access controls, or consider disabling the vulnerable endpoint until a fix is available [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.