CVE-2025-11337
Description
A vulnerability was detected in Four-Faith Water Conservancy Informatization Platform up to 2.2. This affects an unknown part of the file /aloneReport/index.do/../../aloneReport/download.do;othersusrlogout.do. Performing manipulation of the argument fileName results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated path traversal vulnerability in Four-Faith Water Conservancy Informatization Platform allows arbitrary file read via the fileName parameter.
Vulnerability
Overview
CVE-2025-11337 is an arbitrary file read vulnerability in the Four-Faith Water Conservancy Informatization Platform up to version 2.2. The flaw resides in the /aloneReport/index.do/../../aloneReport/download.do endpoint, where the fileName parameter is processed without proper validation. This allows directory traversal sequences (e.g., ../) to be injected, enabling an attacker to read arbitrary files from the server [1].
Exploitation
The vulnerability can be exploited remotely without authentication. A crafted GET request to the vulnerable endpoint with a manipulated fileName parameter, such as ../WEB-INF/classes/web.properties, triggers the path traversal. The exploit is publicly available and has been demonstrated against a live test environment [1].
Impact
Successful exploitation allows an unauthenticated attacker to read sensitive files from the server, including configuration files (e.g., web.properties), potentially exposing credentials, database connection strings, and other confidential data. This could lead to further compromise of the application and underlying infrastructure [1].
Mitigation
The vendor was contacted but did not respond. No official patch or workaround has been released. Users should consider restricting access to the vulnerable endpoint via network controls or upgrading to a patched version if one becomes available. The vulnerability is publicly known and should be prioritized for remediation [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=2.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.