CVE-2025-12923

A vulnerability was determined in liweiyi ChestnutCMS up to 1.5.8. This vulnerability affects the function resourceDownload of the file /dev-api/common/download. Executing manipulation of the argument path can lead to path traversal. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
References
Link Resource
https://github.com/Huu1j/CVE/blob/main/chestnutcms%20Arbitrary%20File%20Read.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.331643 Permissions Required VDB Entry
https://vuldb.com/?id.331643 Third Party Advisory VDB Entry
https://vuldb.com/?submit.681032 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:1000mz:chestnutcms:*:*:*:*:*:*:*:*

History

21 Nov 2025, 15:31

Type Values Removed Values Added
CPE cpe:2.3:a:1000mz:chestnutcms:*:*:*:*:*:*:*:*
First Time 1000mz
1000mz chestnutcms
References () https://github.com/Huu1j/CVE/blob/main/chestnutcms%20Arbitrary%20File%20Read.md - () https://github.com/Huu1j/CVE/blob/main/chestnutcms%20Arbitrary%20File%20Read.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.331643 - () https://vuldb.com/?ctiid.331643 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.331643 - () https://vuldb.com/?id.331643 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.681032 - () https://vuldb.com/?submit.681032 - Third Party Advisory, VDB Entry

10 Nov 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-10 01:15

Updated : 2025-11-21 15:31


NVD link : CVE-2025-12923

Mitre link : CVE-2025-12923

CVE.ORG link : CVE-2025-12923


JSON object : View

Products Affected

1000mz

  • chestnutcms
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')