{"id":"CVE-2025-63298","details":"A path traversal vulnerability was identified in SourceCodester Pet Grooming Management System 1.0, affecting the admin/manage_website.php component. An authenticated user with administrative privileges can leverage this flaw by submitting a specially crafted POST request, enabling the deletion of arbitrary files on the web server or underlying operating system.","modified":"2026-04-10T05:33:26.854200Z","published":"2025-10-30T19:16:35.753Z","references":[{"type":"WEB","url":"https://www.sourcecodester.com/sites/default/files/download/mayuri_k/petgrooming_erp.zip"},{"type":"EVIDENCE","url":"https://github.com/z3rObyte/CVE-2025-63298"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63298.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"}]}