CVE-2025-7450
Description
A vulnerability was found in letseeqiji gorobbs up to 1.0.8. It has been classified as critical. This affects the function ResetUserAvatar of the file controller/api/v1/user.go of the component API. The manipulation of the argument filename leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A path traversal vulnerability in gorobbs <=1.0.8 allows remote attackers to write arbitrary files via the ResetUserAvatar API endpoint.
The ResetUserAvatar function in controller/api/v1/user.go of gorobbs (up to version 1.0.8) is vulnerable to path traversal. The code constructs a file path by directly concatenating the user-supplied filename parameter from the uploaded avatar file with a base directory (upload/avatar/). No sanitization or validation is performed to prevent directory traversal sequences (e.g., ../), allowing the filename to escape the intended upload directory [1].
An unauthenticated remote attacker can exploit this by crafting the filename parameter with path traversal patterns. For example, setting the filename to ../../../../etc/pwn.png and the user id parameter to ../../../ enables writing a file to an arbitrary location on the server [1]. The endpoint is publicly accessible and does not require authentication to trigger the file write operation, as shown in the referenced code block [1].
Successful exploitation permits writing arbitrary file content to any directory the web server process can write to. This can lead to remote code execution if an attacker writes a malicious script (e.g., a PHP or shell file) into a web-accessible directory, or overwrites critical system files [1]. The vendor advisory and public exploit disclosure confirm the critical nature of the vulnerability [1].
As of the publication date, the vendor has not released a patch; the issue remains open in the project's GitHub repository. Users are advised to restrict access to the /api/v1/user endpoint, implement rigorous input validation for file uploads, and monitor the repository for a fix [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.