Impact
A vulnerability in bolo-solo up to version 2.6.4 allows a malicious actor to manipulate the file argument in the importFromCnblogs function of BackupService.java, leading to a path traversal flaw (CWE-22). This flaw permits the attacker to construct file paths that escape the intended directory boundaries and potentially read or modify arbitrary files on the host. Public disclosures and remote exploitation vectors are documented, meaning the flaw can be triggered from an external network position.
Affected Systems
The affected product is bolo-blog's bolo-solo component, versions up to and including 2.6.4. All installations of bolo-solo without a patch or upgrade that removes the path traversal vulnerability are susceptible. The vulnerability impacts the Filename Handler module that processes backup imports from cnblogs.
Risk and Exploitability
The base CVSS score of 5.3 indicates a moderate impact, while the EPSS score of less than 1% reflects a low current exploitation probability yet the public availability of exploitation code raises the risk. The flaw is not listed in the CISA KEV catalog. The attacker likely needs only a crafted request to the importFromCnblogs endpoint, and no authentication is mentioned, so remote exploitation can affect any exposed instance.
OpenCVE Enrichment