CVE-2025-25759
Published: 27 February 2025
Summary
CVE-2025-25759 is a high-severity Path Traversal (CWE-22) vulnerability in Sucms Project Sucms. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 26.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly validates crafted GET request parameters in admin_template.php to block directory traversal and prevent arbitrary file deletion.
Identifies, reports, and corrects the path traversal flaw in SUCMS v1.0's admin_template.php, eliminating the vulnerability root cause.
Restricts types and characteristics of GET request inputs to exclude path traversal sequences like '../' targeting arbitrary file deletion.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Web-based path traversal enables remote exploitation of public-facing app (T1190) and direct arbitrary file deletion for indicator removal or data destruction (T1070.004, T1485).
NVD Description
An issue in the component admin_template.php of SUCMS v1.0 allows attackers to execute a directory traversal and arbitrary file deletion via a crafted GET request.
Deeper analysisAI
CVE-2025-25759 is a vulnerability in the admin_template.php component of SUCMS version 1.0. It enables directory traversal and arbitrary file deletion through a crafted GET request. The issue is linked to CWE-22 (path traversal) and CWE-552 (files or directories accessible to external parties), with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), indicating high severity due to its integrity impact.
Remote unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows deletion of arbitrary files on the affected system, potentially disrupting operations by removing critical files without affecting confidentiality or availability directly.
Mitigation details are available in the referenced advisory at https://github.com/147536951/Qianyi-learn/blob/main/SUCMS.pdf, published on 2025-02-27.
Details
- CWE(s)