Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31013 | Datart 1.0.0-rc.3 is vulnerable to Directory Traversal in the POST /viz/image interface, since the server directly uses MultipartFile.transferTo() to save the uploaded file to a path controllable by the user, and lacks strict verification of the file name. |
Fri, 10 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Running-elephant
Running-elephant datart |
|
| CPEs | cpe:2.3:a:running-elephant:datart:1.0.0:rc3:*:*:*:*:*:* | |
| Vendors & Products |
Running-elephant
Running-elephant datart |
Thu, 25 Sep 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Datart
Datart datart |
|
| Vendors & Products |
Datart
Datart datart |
Wed, 24 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
Wed, 24 Sep 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Datart 1.0.0-rc.3 is vulnerable to Directory Traversal in the POST /viz/image interface, since the server directly uses MultipartFile.transferTo() to save the uploaded file to a path controllable by the user, and lacks strict verification of the file name. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-24T17:23:05.934Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-56815
Updated: 2025-09-24T17:22:27.569Z
Status : Analyzed
Published: 2025-09-24T17:15:41.227
Modified: 2025-10-10T21:07:03.727
Link: CVE-2025-56815
No data.
OpenCVE Enrichment
Updated: 2025-09-25T08:21:25Z
EUVD