Impact
Sanluan PublicCMS 6.202506.d contains a path‑traversal weakness located in the saveMetadata method of TemplateCacheComponent.java within the Template Cache Generation component. The flaw allows an attacker to construct input that resolves filesystem paths outside the intended cache directory, potentially enabling unauthorized access to sensitive files or arbitrary file writes. The vulnerability is triggered by remote requests and is already exploited through publicly available code, exposing the system to significant confidentiality and integrity risks.
Affected Systems
Sanluan PublicCMS 6.202506.d is affected. The vulnerability arises in the Template Cache Generation component's TemplateCacheComponent.java file. All installations of this specific version that expose the saveMetadata functionality are vulnerable. The component is part of the standard PublicCMS distribution, so any instance running 6.202506.d inherits the flaw.
Risk and Exploitability
This issue has a CVSS score of 5.3, indicating moderate severity. Its EPSS score is below 1 %, suggesting that exploit attempts are currently infrequent, and it is not listed in CISA’s KEV catalog. However, publicly available code demonstrates the vulnerability can be triggered via remote requests, enabling attackers to construct input that resolves to paths outside the intended cache directory. If successful, an attacker could read arbitrary files or write malicious content, compromising confidentiality, integrity, or availability of the server.
OpenCVE Enrichment