CVE-2025-65879
Published: 05 December 2025
Description
Warehouse Management System 1.2 contains an authenticated arbitrary file deletion vulnerability. The /goods/deleteGoods endpoint accepts a user-controlled goodsimg parameter, which is directly concatenated with the server's UPLOAD_PATH and passed to File.delete() without validation. A remote authenticated attacker can delete arbitrary…
more
files on the server by supplying directory traversal payloads.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation mechanisms for the user-controlled goodsimg parameter to prevent directory traversal payloads from enabling arbitrary file deletion.
SI-9 enforces input restrictions at application boundaries to block traversal characters like '../' in the goodsimg parameter.
AC-3 enforces access control policies that restrict file deletion operations to only intended resources, addressing improper pathname limitations.
Security SummaryAI
CVE-2025-65879 is an authenticated arbitrary file deletion vulnerability in Warehouse Management System version 1.2. The flaw occurs in the /goods/deleteGoods endpoint, where the user-controlled goodsimg parameter is directly concatenated with the server's UPLOAD_PATH and passed to File.delete() without any validation. This allows directory traversal payloads to target files outside the intended upload directory.
A remote authenticated attacker with low privileges (PR:L) can exploit the vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation enables the deletion of arbitrary files on the server, resulting in high impacts to integrity (I:H) and availability (A:H), but no confidentiality loss (C:N). The vulnerability carries a CVSS v3.1 base score of 8.1 and is associated with CWE-22 (Improper Limitation of a Pathname to a Restricted Directory).
Mitigation details are available in the referenced advisory at https://github.com/W000i/vuln/issues/3, published on 2025-12-05.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows authenticated arbitrary file deletion via path traversal in a public-facing web application endpoint, enabling exploitation of public-facing applications (T1190), indicator removal via file deletion (T1070.004, T1107), and data destruction (T1485) including logs, configs, and critical files for DoS.