Impact
The vulnerability resides in the recognizeMarkdown function of Pdf2MdUtil.java in the taoofagi easegen-admin project. By manipulating the fileUrl argument, an attacker can trigger a path traversal that may allow reading arbitrary files on the server. This weakness, identified as CWE‑22, can compromise the confidentiality of sensitive data. The impact is a potential information disclosure if the file traversal resolves to restricted files.
Affected Systems
The affected application is taoofagi easegen-admin with versions up to commit 8f87936ac774065b92fb20aab55b274a6ea76433. The specific code path is within yudao-module-digitalcourse/util/Pdf2MdUtil.java. No fixed release or version number is provided; the vendor follows rolling releases and has not published an updated version for this issue.
Risk and Exploitability
The CVSS v3.1 score is 5.1, indicating moderate severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. The vendor did not release an official fix; the exploit is publicly available and can be launched remotely from an unauthenticated or authenticated request to the recognizeMarkdown endpoint. The risk is moderate, with potential for non‑repudiation and confidentiality compromise if the application is exposed to untrusted input.
OpenCVE Enrichment