VYPR
Moderate severityNVD Advisory· Published Nov 17, 2025· Updated Nov 17, 2025

lsfusion platform DownloadFileRequestHandler.java DownloadFileRequestHandler path traversal

CVE-2025-13261

Description

A vulnerability was found in lsfusion platform up to 6.1. Affected is the function DownloadFileRequestHandler of the file web-client/src/main/java/lsfusion/http/controller/file/DownloadFileRequestHandler.java. Performing manipulation of the argument Version results in path traversal. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Path traversal in lsFusion platform ≤6.1 via unvalidated version parameter in DownloadFileRequestHandler allows unauthorized remote file read.

The vulnerability resides in the DownloadFileRequestHandler class located at web-client/src/main/java/lsfusion/http/controller/file/DownloadFileRequestHandler.java in the lsFusion platform up to version 6.1 [1]. The issue is a path traversal flaw: the handleRequest method accepts a version parameter without proper validation. When an attacker requests the endpoint /file/static/noauth (with no trailing path), the filename is constructed solely from this unvalidated version parameter and appended directly to FileUtils.APP_DOWNLOAD_FOLDER_PATH, bypassing the path restrictions applied to other API patterns [3].

Exploitation is straightforward and does not require authentication. The /file/static/noauth/** endpoint is designed to serve logos and icons without authentication. By sending a request to /file/static/noauth and including directory traversal sequences (e.g., ../) in the version parameter, an attacker can force the application to read arbitrary files from the server's filesystem [3]. The exploit technique has been publicly disclosed, increasing the risk of active attacks.

The impact is unauthorized disclosure of sensitive files on the server, potentially including configuration files, application source code, credentials, or other data stored in files accessible to the lsFusion process. The CVSS severity has not been officially assigned by NVD at the time of writing, but the vector suggests high confidentiality impact [2].

As of the latest available information, the vulnerability affects lsFusion versions ≤6.1. The lsFusion project is open source and hosted on GitHub [1]. Users should update to a patched version if available, or apply input validation to the version parameter and restrict access to the /file/static/noauth endpoint to mitigate the risk. No official patch has been documented in the provided references, so users must monitor the vendor's repository for fixes.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
lsfusion.platform:web-clientMaven
<= 6.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.