First published: Thu May 01 2025(Updated: )
A vulnerability was found in xiaowei1118 java_server up to 11a5bac8f4ba1c17e4bc1b27cad6d24868500e3a on Windows and classified as critical. This issue affects some unknown processing of the file /src/main/java/com/changyu/foryou/controller/FoodController.java of the component File Upload API. The manipulation leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
xiaowei1118 java_server | <11a5bac8f4ba1c17e4bc1b27cad6d24868500e3a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4178 is classified as a critical vulnerability.
To fix CVE-2025-4178, update the xiaowei1118 java_server to a version beyond 11a5bac8f4ba1c17e4bc1b27cad6d24868500e3a.
CVE-2025-4178 affects the file /src/main/java/com/changyu/foryou/controller/FoodController.java in the xiaowei1118 java_server.
CVE-2025-4178 affects xiaowei1118 java_server versions up to 11a5bac8f4ba1c17e4bc1b27cad6d24868500e3a.
CVE-2025-4178 pertains to an unknown processing issue within the file upload component.