Impact
An authenticated attacker with administrative privileges can use insufficient path sanitization in Casdoor’s Local File System storage provider to perform a path traversal, enabling the creation or overwriting of arbitrary files on the host filesystem. This flaw compromises the intended sandbox, potentially allowing modification of critical application files or insertion of malicious content. The primary impact is privilege escalation, leading to integrity and confidentiality violations.
Affected Systems
Affected product is Casdoor, specifically the Casdoor Casdoor implementation that utilizes the Local File System storage provider. No specific version information is provided, so all installations that use this storage provider are potentially vulnerable until a patch is released. Administrators should verify whether their deployment includes the affected component.
Risk and Exploitability
The vulnerability requires authentication and administrative rights, which limits the attack surface to users who have legitimate access to the system. No CVSS or EPSS score is available, and the flaw is not listed in CISA KEV. Nevertheless, the ability to write arbitrary files could lead to code execution or data tampering if exploited. Until a fix is issued, the risk is considered high for environments where administrative credentials are accessible or where the component is exposed to potentially compromised users.
OpenCVE Enrichment