lsfusion platform DownloadFileRequestHandler.java DownloadFileRequestHandler path traversal
Description
A vulnerability was found in lsfusion platform up to 6.1. Affected is the function DownloadFileRequestHandler of the file web-client/src/main/java/lsfusion/http/controller/file/DownloadFileRequestHandler.java. Performing manipulation of the argument Version results in path traversal. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Path traversal in lsFusion platform ≤6.1 via unvalidated version parameter in DownloadFileRequestHandler allows unauthorized remote file read.
The vulnerability resides in the DownloadFileRequestHandler class located at web-client/src/main/java/lsfusion/http/controller/file/DownloadFileRequestHandler.java in the lsFusion platform up to version 6.1 [1]. The issue is a path traversal flaw: the handleRequest method accepts a version parameter without proper validation. When an attacker requests the endpoint /file/static/noauth (with no trailing path), the filename is constructed solely from this unvalidated version parameter and appended directly to FileUtils.APP_DOWNLOAD_FOLDER_PATH, bypassing the path restrictions applied to other API patterns [3].
Exploitation is straightforward and does not require authentication. The /file/static/noauth/** endpoint is designed to serve logos and icons without authentication. By sending a request to /file/static/noauth and including directory traversal sequences (e.g., ../) in the version parameter, an attacker can force the application to read arbitrary files from the server's filesystem [3]. The exploit technique has been publicly disclosed, increasing the risk of active attacks.
The impact is unauthorized disclosure of sensitive files on the server, potentially including configuration files, application source code, credentials, or other data stored in files accessible to the lsFusion process. The CVSS severity has not been officially assigned by NVD at the time of writing, but the vector suggests high confidentiality impact [2].
As of the latest available information, the vulnerability affects lsFusion versions ≤6.1. The lsFusion project is open source and hosted on GitHub [1]. Users should update to a patched version if available, or apply input validation to the version parameter and restrict access to the /file/static/noauth endpoint to mitigate the risk. No official patch has been documented in the provided references, so users must monitor the vendor's repository for fixes.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
lsfusion.platform:web-clientMaven | <= 6.1 | — |
Affected products
2- Range: <=6.1
- lsfusion/platformv5Range: 6.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/lsfusion/platform/issues/1543ghsaexploitissue-trackingWEB
- github.com/advisories/GHSA-5jpg-2rj5-964cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-13261ghsaADVISORY
- vuldb.comghsathird-party-advisoryWEB
- github.com/lsfusion/platform/issues/1543ghsaissue-trackingWEB
- vuldb.comghsasignaturepermissions-requiredWEB
- vuldb.comghsavdb-entrytechnical-descriptionWEB
News mentions
0No linked articles in our index yet.