CVE-2025-0702

A vulnerability classified as critical was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This vulnerability affects unknown code of the file src/main/java/io/github/controller/SysFileController.java. The manipulation of the argument portraitFile leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
References
Link Resource
https://github.com/JoeyBling/bootplus/issues/24 Not Applicable
https://github.com/JoeyBling/bootplus/issues/24#issue-2786919432 Not Applicable
https://vuldb.com/?ctiid.293230 Permissions Required VDB Entry
https://vuldb.com/?id.293230 Third Party Advisory VDB Entry
https://vuldb.com/?submit.480841 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:joeybling:bootplus:*:*:*:*:*:*:*:*

History

10 Oct 2025, 19:04

Type Values Removed Values Added
First Time Joeybling bootplus
Joeybling
References () https://github.com/JoeyBling/bootplus/issues/24 - () https://github.com/JoeyBling/bootplus/issues/24 - Not Applicable
References () https://github.com/JoeyBling/bootplus/issues/24#issue-2786919432 - () https://github.com/JoeyBling/bootplus/issues/24#issue-2786919432 - Not Applicable
References () https://vuldb.com/?ctiid.293230 - () https://vuldb.com/?ctiid.293230 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.293230 - () https://vuldb.com/?id.293230 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.480841 - () https://vuldb.com/?submit.480841 - Third Party Advisory, VDB Entry
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como crítica en JoeyBling bootplus hasta 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. Esta vulnerabilidad afecta al código desconocido del archivo src/main/java/io/github/controller/SysFileController.java. La manipulación del argumento portraitFile provoca una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. Este producto utiliza la entrega continua con lanzamientos continuos. Por lo tanto, no hay disponibles detalles de las versiones afectadas ni de los lanzamientos actualizados.
CPE cpe:2.3:a:joeybling:bootplus:*:*:*:*:*:*:*:*

24 Jan 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-24 18:15

Updated : 2025-10-10 19:04


NVD link : CVE-2025-0702

Mitre link : CVE-2025-0702

CVE.ORG link : CVE-2025-0702


JSON object : View

Products Affected

joeybling

  • bootplus
CWE
CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type