Cyber Posture

CVE-2025-2193

MediumPublic PoC

Published: 11 March 2025

Published
11 March 2025
Modified
09 April 2025
KEV Added
Patch
CVSS Score 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
EPSS Score 0.0031 54.1th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2193 is a medium-severity Path Traversal (CWE-22) vulnerability in Mrcms Mrcms. Its CVSS base score is 5.4 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 45.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of the manipulated path/name argument in the FileController delete function to block path traversal sequences like '../'.

prevent

Mandates identification, reporting, and correction of the critical path traversal flaw in MRCMS 3.1.2, including application of patches or mitigations despite vendor non-response.

prevent

Enforces boundary protection at web interfaces to inspect and deny requests to /admin/file/delete.do containing path traversal payloads.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated path traversal in public-facing web app delete endpoint enables exploitation of public-facing application (T1190), exploitation for privilege escalation (T1068 via vertical escalation to admin file delete), and arbitrary file deletion (T1070.004 for indicator removal or impact).

NVD Description

A vulnerability has been found in MRCMS 3.1.2 and classified as critical. This vulnerability affects the function delete of the file /admin/file/delete.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument path/name leads to path traversal. The attack can be…

more

initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-2193 is a path traversal vulnerability (CWE-22) classified as critical in MRCMS version 3.1.2. It affects the delete function in the file /admin/file/delete.do within the component org.marker.mushroom.controller.FileController, where manipulation of the path/name argument enables the issue.

The vulnerability allows remote exploitation by low-privileged users (PR:L) with low attack complexity (AC:L) and no user interaction required (UI:N). Successful attacks result in low integrity (I:L) and availability (A:L) impacts but no confidentiality loss (C:N), yielding a CVSS v3.1 base score of 5.4 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).

Advisories from VulDB indicate the vendor was contacted early about the disclosure but provided no response, with no patches mentioned. The exploit has been publicly disclosed via a GitHub issue and may be in use.

Details

CWE(s)

Affected Products

mrcms
mrcms
3.1.2

CVEs Like This One

CVE-2026-31272Same product: Mrcms Mrcms
CVE-2026-3243Shared CWE-22
CVE-2026-35214Shared CWE-22
CVE-2025-2328Shared CWE-22
CVE-2025-66251Shared CWE-22
CVE-2025-6439Shared CWE-22
CVE-2025-14344Shared CWE-22
CVE-2026-32727Shared CWE-22
CVE-2026-6832Shared CWE-22
CVE-2026-34728Shared CWE-22

References