{"id":"CVE-2025-13262","details":"A vulnerability was determined in lsfusion platform up to 6.1. Affected by this vulnerability is the function UploadFileRequestHandler of the file platform/web-client/src/main/java/lsfusion/http/controller/file/UploadFileRequestHandler.java. Executing manipulation of the argument sid can lead to path traversal. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.","aliases":["GHSA-gwwr-j923-vq7r"],"modified":"2026-04-02T12:34:48.061091Z","published":"2025-11-17T05:16:04.427Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?submit.689414"},{"type":"ADVISORY","url":"https://vuldb.com/?id.332597"},{"type":"REPORT","url":"https://github.com/lsfusion/platform/issues/1544"},{"type":"REPORT","url":"https://github.com/lsfusion/platform/issues/1544#issue-3589610731"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.332597"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/lsfusion/platform","events":[{"introduced":"0"},{"last_affected":"cbbef9c5ac9ea6365164cd94914026d608ea832d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"6.1"}]}}],"versions":["1.0.0","1.0.1","1.0.2","1.1.0","1.1.1","1.1.2","1.2.0","1.2.1","1.2.2","1.2.3","1.2.4","1.3.0","1.3.1","1.3.2","1.3.3","1.3.4","2.0","2.1","2.2","2.3","2.4","3.0","3.1","3.beta.0","4.0","4.0-beta0","4.0-beta1","4.0-beta2","4.0-beta3","4.1","5.0","5.0-beta0","5.1","6.0","6.0-beta0","6.0-beta1","6.0-beta2","6.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13262.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}