Impact
This vulnerability arises in the deleteDirectory function of the WebFileTemplateController, allowing an attacker to manipulate file paths and delete files outside the intended directory scope. The description indicates that the attack may be performed from remote, suggesting that remote attackers can specify arbitrary file paths through the delete endpoint, potentially removing critical configuration files or user data. Such an action compromises data integrity and availability, especially if the affected files belong to the CMS core or site content.
Affected Systems
The flaw affects Dromara UJCMS version 101.2 and earlier releases. System administrators should verify the exact build installed and check for updates provided by the vendor.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity for the path traversal flaw. The EPSS score of less than 1% signals a currently low exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack can be performed remotely by sending a crafted request to the delete endpoint of the WebFileTemplateController. This inference assumes an HTTP interface, which is suggested by the web controller naming convention. The CVE description does not provide specifics about authentication or authorization checks, so it is unclear whether an attacker would require prior access to the CMS. Nonetheless, successful exploitation would allow deletion of arbitrary files within the server filesystem, potentially compromising data integrity and availability.
OpenCVE Enrichment