Impact
A vulnerability has been identified in SSCMS versions up to 7.4.0 that allows manipulation of the argument path in the PathUtils.RemoveParentPath function located in /api/admin/plugins/install/actions/download. This manipulation enables path traversal, opening the possibility for remote attackers to read arbitrary files on the server. The weakness corresponds to CWE-22. The most immediate consequence is potential unauthorized disclosure of sensitive information or system configuration files, which could be leveraged by a skilled attacker to further compromise the system.
Affected Systems
Affected vendors include SSCMS (product name: SSCMS). The vulnerability impacts all releases up to and including version 7.4.0. The Common Platform Enumeration for this product is cpe:2.3:a:sscms:sscms:*:*:*:*:*:*:*.*.
Risk and Exploitability
The CVSS score is 5.1, indicating a moderate level of severity. EPSS is reported to be less than 1%, meaning the public exploitation probability is currently low. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Remote exploitation is feasible via the exposed HTTP endpoint, and the exploit has been publicly disclosed. However, the likelihood of a coordinated attack remains low due to the low EPSS and lack of active vendor response.
OpenCVE Enrichment