CVE-2025-6534

4.2 MEDIUM

📋 TL;DR

This vulnerability in novel-plus allows remote attackers to delete arbitrary files due to missing authorization checks in the file removal function. It affects all systems running novel-plus up to version 5.1.3. Attackers can exploit this to delete critical system files, though exploitation requires high complexity.

💻 Affected Systems

Products:
  • xxyopen/201206030 novel-plus
Versions: Up to and including version 5.1.3
Operating Systems: Any OS running novel-plus (typically Linux)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations up to 5.1.3 are vulnerable by default. The vulnerability exists in the file handling component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical operating system files, configuration files, or application data leading to service disruption or data loss.

🟠

Likely Case

Application data corruption or deletion, potentially causing service disruption or loss of user-uploaded content.

🟢

If Mitigated

Minimal impact with proper file permission controls and network segmentation limiting file deletion to non-critical directories.

🌐 Internet-Facing: MEDIUM - While remote exploitation is possible, the high complexity and difficulty of exploitation reduce immediate risk for internet-facing systems.
🏢 Internal Only: MEDIUM - Internal attackers with knowledge of the system could exploit this to disrupt services or delete important files.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploit code has been publicly disclosed, but successful exploitation requires specific knowledge of the system and high technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider upgrading to any version beyond 5.1.3 if available, or implement workarounds.

🔧 Temporary Workarounds

Implement Authorization Checks

all

Add proper authorization checks to the FileController.java remove function to verify user permissions before file deletion.

Modify novel-admin/src/main/java/com/java2nb/common/controller/FileController.java to include authentication and authorization validation

Restrict File Deletion Permissions

linux

Configure file system permissions to limit what files the novel-plus application user can delete.

chmod -R 755 /path/to/novel-plus/uploads
chown -R www-data:www-data /path/to/novel-plus/uploads

🧯 If You Can't Patch

  • Implement network segmentation to isolate novel-plus servers from critical systems
  • Deploy file integrity monitoring to detect unauthorized file deletions

🔍 How to Verify

Check if Vulnerable:

Check the novel-plus version. If version is 5.1.3 or earlier, the system is vulnerable.

Check Version:

Check application configuration files or admin panel for version information

Verify Fix Applied:

Test file deletion functionality with unauthorized users to ensure proper authorization checks are in place.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file deletion attempts in application logs
  • Failed authentication attempts followed by file operations

Network Indicators:

  • Unusual HTTP POST requests to file deletion endpoints from unexpected sources

SIEM Query:

source="novel-plus" AND (action="delete" OR action="remove") AND user="unauthenticated"

🔗 References

📤 Share & Export