CVE-2025-65879

8.1 HIGH

📋 TL;DR

Warehouse Management System 1.2 contains an authenticated arbitrary file deletion vulnerability. Remote authenticated attackers can delete arbitrary files on the server using directory traversal payloads via the /goods/deleteGoods endpoint. This affects all deployments running Warehouse Management System version 1.2.

💻 Affected Systems

Products:
  • Warehouse Management System
Versions: 1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.2 are vulnerable by default. The vulnerability requires authenticated access but no special privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, configuration files, or application files leading to service disruption, data loss, or privilege escalation.

🟠

Likely Case

Data loss and service disruption through deletion of application files, uploaded content, or configuration files, potentially causing business operations to halt.

🟢

If Mitigated

Limited impact if proper file permission controls and input validation are in place, restricting deletion to non-critical files within the intended directory.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation is straightforward with authenticated access. The GitHub reference demonstrates the vulnerability and likely contains proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. If patch is available, download and apply according to vendor instructions. 3. Validate fix by testing the vulnerable endpoint with traversal payloads.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation to reject directory traversal sequences in the goodsimg parameter.

Implement code to validate goodsimg parameter contains only allowed characters and doesn't contain ../ or similar traversal sequences

File Permission Restriction

linux

Set strict file permissions on the UPLOAD_PATH directory to prevent deletion of files outside intended scope.

chmod 750 /path/to/upload_directory
chown www-data:www-data /path/to/upload_directory

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests containing directory traversal patterns to the /goods/deleteGoods endpoint.
  • Restrict network access to the application to only trusted users and implement strong authentication controls to limit potential attackers.

🔍 How to Verify

Check if Vulnerable:

Test the /goods/deleteGoods endpoint with authenticated requests containing directory traversal payloads in the goodsimg parameter (e.g., '../../etc/passwd').

Check Version:

Check application version in admin panel or configuration files. For web interface, look for version information in footer or about page.

Verify Fix Applied:

After applying fixes, test the same endpoint with traversal payloads and verify they are rejected or sanitized, and no arbitrary files are deleted.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /goods/deleteGoods containing '../' or similar patterns in parameters
  • File deletion errors in application logs for paths outside UPLOAD_PATH

Network Indicators:

  • POST requests to /goods/deleteGoods with unusual parameter values containing traversal sequences

SIEM Query:

source="web_server_logs" AND uri_path="/goods/deleteGoods" AND (param="*../*" OR param="*..\\*" OR param="*%2e%2e%2f*")

🔗 References

📤 Share & Export