Cyber Posture

CVE-2025-63298

HighPublic PoC

Published: 30 October 2025

Published
30 October 2025
Modified
06 November 2025
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
EPSS Score 0.0014 34.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-63298 is a high-severity Path Traversal: '../filedir' (CWE-24) vulnerability in Mayurik Pet Grooming Management Software. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique File Deletion (T1070.004); ranked at the 34.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to File Deletion (T1070.004) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of user-supplied inputs to the admin/manage_website.php component, directly preventing path traversal payloads in crafted POST requests that enable arbitrary file deletion.

prevent

Mandates timely identification, reporting, and correction of the specific path traversal flaw (CWE-24) in the Pet Grooming Management System, eliminating the vulnerability.

prevent

Enforces least privilege for the web server process handling admin requests, limiting the scope of deletable files even if path traversal succeeds.

MITRE ATT&CK Enterprise TechniquesAI

T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Path traversal enables arbitrary file deletion on the web server/OS, facilitating indicator removal via file deletion (T1070.004, T1107), data destruction (T1485), and endpoint DoS through application exploitation by deleting critical files like index.php (T1499.004).

NVD Description

A path traversal vulnerability was identified in SourceCodester Pet Grooming Management System 1.0, affecting the admin/manage_website.php component. An authenticated user with administrative privileges can leverage this flaw by submitting a specially crafted POST request, enabling the deletion of arbitrary files…

more

on the web server or underlying operating system.

Deeper analysisAI

CVE-2025-63298 is a path traversal vulnerability in the SourceCodester Pet Grooming Management System 1.0, specifically affecting the admin/manage_website.php component. It has a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H) and is associated with CWE-24. The flaw was published on 2025-10-30.

An authenticated user with administrative privileges can exploit this vulnerability by submitting a specially crafted POST request. Successful exploitation enables the deletion of arbitrary files on the web server or underlying operating system, potentially leading to significant availability impacts.

Mitigation details and further technical information, including proof-of-concept exploitation, are available in the referenced GitHub repository at https://github.com/z3rObyte/CVE-2025-63298. The affected software can be downloaded from https://www.sourcecodester.com/sites/default/files/download/mayuri_k/petgrooming_erp.zip for testing and verification. No vendor patches are detailed in the provided information.

Details

CWE(s)

Affected Products

mayurik
pet grooming management software
1.0

CVEs Like This One

CVE-2026-1702Same product: Mayurik Pet Grooming Management Software
CVE-2025-1599Same vendor: Mayurik
CVE-2026-40318Shared CWE-24
CVE-2025-0802Same vendor: Mayurik
CVE-2025-1869Same vendor: Mayurik
CVE-2025-1593Same vendor: Mayurik
CVE-2025-1596Same vendor: Mayurik
CVE-2025-1200Same vendor: Mayurik
CVE-2025-1598Same vendor: Mayurik
CVE-2025-1872Same vendor: Mayurik

References