A vulnerability classified as critical has been found in diyhi bbs 6.8. Affected is the function Add of the file /src/main/java/cms/web/action/template/ForumManageAction.java of the component API. The manipulation of the argument dirName leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250618-01.md | Exploit |
| https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250618-01.md#steps-to-reproduce | Exploit |
| https://vuldb.com/?ctiid.313560 | Permissions Required VDB Entry |
| https://vuldb.com/?id.313560 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.598862 | Third Party Advisory VDB Entry |
| https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250618-01.md | Exploit |
Configurations
History
No history.
Information
Published : 2025-06-22 03:15
Updated : 2025-09-04 15:47
NVD link : CVE-2025-6453
Mitre link : CVE-2025-6453
CVE.ORG link : CVE-2025-6453
JSON object : View
Products Affected
diyhi
- bbs
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
