CVE-2025-13816

Source
https://cve.org/CVERecord?id=CVE-2025-13816
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13816.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-13816
Published
2025-12-01T09:16:05.593Z
Modified
2026-03-12T17:37:43.847062Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A security vulnerability has been detected in moxi159753 Mogu Blog v2 up to 5.2. The impacted element is the function FileOperation.unzip of the file /networkDisk/unzipFile of the component ZIP File Handler. Such manipulation of the argument fileUrl leads to path traversal. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Git / github.com/moxi624/mogu_blog_v2

Affected ranges

Type
GIT
Repo
https://github.com/moxi624/mogu_blog_v2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "5.2"
        }
    ]
}

Affected versions

V4.*
V4.0
V4.1
V4.2
V4.3
V4.4
V4.5
V5.*
V5.0
V5.1
v5.*
v5.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13816.json"