VYPR
Medium severity5.5NVD Advisory· Published Dec 19, 2025· Updated Apr 15, 2026

CVE-2025-14965

CVE-2025-14965

Description

A vulnerability was found in 1541492390c yougou-mall up to 0a771fa817c924efe52c8fe0a9a6658eee675f9f. This impacts the function upload/delete of the file src/main/java/per/ccm/ygmall/extra/controller/ResourceController.java. Performing manipulation results in path traversal. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Yougou-mall before commit 0a771fa has path traversal in ResourceController's upload/delete due to weak filename validation, enabling arbitrary file deletion.

Vulnerability

Overview

The vulnerability resides in the ResourceController.java file of the yougou-mall application, specifically in the upload and delete methods. The application uses a rolling release model and the issue is present up to commit 0a771fa817c924efe52c8fe0fe8a9a6658eee675f9f. The root cause is insufficient validation of file paths and names. The validateObjectName method splits the input string only by the '/' character and checks if any segment equals '.' or '..' . As noted in [1], this allows bypasses via URL encoding (e.g., %2e%2e%2f), absolute paths (e.g., /etc/passwd), or special character/delimiter combinations (e.g., .../ on some systems).

Exploitation

Prerequisites and Attack Surface

An attacker does not require authentication to reach the vulnerable endpoints. By crafting a malicious file name or path in the upload or delete request, the attacker can bypass the weak validation. The reference analysis [1] details methods such as encoding traversal sequences with %2e%2e%2f or using absolute paths without any '..' segments, which the simplistic split-based check cannot detect.

Impact

Successful exploitation allows an attacker to perform arbitrary file deletion on the server. According to [1], this can lead to high-risk consequences such as deleting critical application disruption or data loss. Additionally, the upload endpoint [2] does not validate file suffixes, enabling arbitrary file uploads that could lead to remote code execution if the uploaded file is served as executable content.

Mitigation

Status

As of the publication date (2025-12-19), no patched version is available because the product is a rolling release without versioned releases. The recommended remediation, as described in [2], is to enforce a whitelist of allowed file extensions and to sanitize the file path thoroughly, blocking any directory traversal patterns such as '../' using proper path normalization rather than simple string splitting.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.