CVE-2025-4175
Description
A vulnerability, which was classified as critical, was found in AlanBinu007 Spring-Boot-Advanced-Projects up to 3.1.3. This affects the function uploadUserProfileImage of the file /Spring-Boot-Advanced-Projects-main/Project-4.SpringBoot-AWS-S3/backend/src/main/java/com/urunov/profile/UserProfileController.java of the component Upload Profile API Endpoint. The manipulation of the argument File leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Path traversal in Spring-Boot-Advanced-Projects file upload endpoint allows remote attackers to write files to arbitrary locations.
Vulnerability
Overview
The vulnerability resides in the /api/v1/user-profile endpoint of the Project-4.SpringBoot-AWS-S3 subproject within the Spring-Boot-Advanced-Projects repository (up to version 3.1.3). The uploadUserProfileImage function in UserProfileController.java fails to validate or sanitize the filename provided in the multipart upload request. This allows an attacker to include path traversal sequences (e.g., ../../../) in the filename, leading to arbitrary file writes on the server's filesystem [1].
Exploitation
Details
An attacker can exploit this vulnerability remotely without authentication by sending a crafted HTTP POST request to /api/v1/user-profile with a multipart file whose filename contains path traversal characters. The backend code directly uses the original filename to create a File object via new File(multipartFile.getOriginalFilename()), and subsequently uploads that file to an S3 bucket. The lack of path validation means the file can be written to any directory the application process has write access to [1].
Impact
Successful exploitation allows an attacker to upload arbitrary files to arbitrary locations on the server. Depending on the server's configuration, this could lead to remote code execution (e.g., overwriting a JSP file), data corruption, or denial of service. The vendor was contacted but did not respond, so no official patch or workaround is available [1].
Mitigation
Status
As of the publication date, no patch has been released by the vendor. Users of the affected project should implement input validation on the filename parameter, restrict write permissions, or consider disabling the vulnerable endpoint until a fix is applied [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=3.1.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.