Metrics
Affected Vendors & Products
Mon, 14 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Sat, 12 Jul 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been found in JoeyBling SpringBoot_MyBatisPlus up to a6a825513bd688f717dbae3a196bc9c9622fea26 and classified as critical. This vulnerability affects the function Download of the file /file/download. The manipulation of the argument Name leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. | |
Title | JoeyBling SpringBoot_MyBatisPlus download path traversal | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-07-12T19:32:05.595Z
Updated: 2025-07-14T16:11:26.282Z
Reserved: 2025-07-11T14:13:50.935Z
Link: CVE-2025-7488

Updated: 2025-07-14T16:11:17.345Z

Status : Awaiting Analysis
Published: 2025-07-12T20:15:23.640
Modified: 2025-07-15T13:14:24.053
Link: CVE-2025-7488

No data.