VYPR
Medium severity5.4NVD Advisory· Published May 21, 2025· Updated Apr 15, 2026

CVE-2025-5029

CVE-2025-5029

Description

A vulnerability has been found in Kingdee Cloud Galaxy Private Cloud BBC System up to 9.0 Patch April 2025 and classified as critical. Affected by this vulnerability is the function BaseServiceFactory.getFileUploadService.deleteFileAction of the file fileUpload/deleteFileAction.jhtml of the component File Handler. The manipulation of the argument filePath leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Kingdee Cloud Galaxy Private Cloud BBC System up to 9.0 Patch April 2025 has a path traversal vulnerability in file deletion allowing remote arbitrary file deletion.

The vulnerability exists in the fileUpload/deleteFileAction.jhtml endpoint of the Kingdee Cloud Galaxy Private Cloud BBC System, affecting versions up to the April 2025 patch. The filePath parameter is not properly sanitized, enabling path traversal attacks. An attacker can supply a crafted filePath to delete files outside the intended directory [1].

Exploitation is straightforward: an unauthenticated remote attacker sends a HTTP request to the vulnerable endpoint with a malicious filePath containing directory traversal sequences (e.g., ../). No special privileges or user interaction are required. The exploit has been publicly disclosed, increasing the risk of active attacks [1].

Successful exploitation allows the attacker to delete arbitrary files on the server, which could lead to denial of service, data loss, or further compromise if critical system files are removed. The impact is limited to file deletion; no direct code execution is described.

Kingdee has released a security patch to fix this vulnerability. Users of BBC System up to 9.0 Patch April 2025 are strongly advised to apply the update as recommended in the official advisory [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.