Published:2025/05/14  Last Updated:2025/05/14

JVNVU#90760614
Multiple vulnerabilities in a-blog cms

Overview

a-blog cms provided by appleple inc. contains multiple vulnerabilities.

Products Affected

CVE-2025-27566, CVE-2025-32999

  • a-blog cms versions prior to Ver. 3.1.43 (Ver. 3.1.x series)
  • a-blog cms versions prior to Ver. 3.0.47 (Ver. 3.0.x series)
According to the developer, a-blog cms Ver. 2.11 and earlier versions, which are now unsupported, are affected by the above vulnerabilities as well.

CVE-2025-36560, CVE-2025-41429
  • a-blog cms Ver. 3.1.43 and earlier (Ver. 3.1.x series)
  • a-blog cms Ver. 3.0.47 and earlier (Ver. 3.0.x series)
  • a-blog cms Ver. 2.11.75 and earlier (Ver. 2.11.x series)
  • a-blog cms Ver. 2.10.63 and earlier (Ver. 2.10.x series)
  • a-blog cms Ver. 2.9.52 and earlier (Ver. 2.9.x series)
  • a-blog cms Ver. 2.8.85 and earlier (Ver. 2.8.x series)
According to the developer, a-blog cms Ver. 2.7.x and earlier versions, which are now unsupported, are affected by the above vulnerabilities as well.

For information about the maintenance policy, please refer to the "Maintenance Policy (Text in Japanese)" provided by the developer.

Description

a-blog cms provided by appleple inc. contains multiple vulnerabilities listed below.

  • Path traversal (CWE-22)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N Base Score 5.1
    • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N Base Score 3.8
    • CVE-2025-27566
    • This is an issue with insufficient path validation in the backup feature, and exploitation requires the administrator privilege
  • Cross-site scripting (CWE-79)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Base Score 4.0
    • CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Base Score 5.4
    • CVE-2025-32999
    • This issue exists in a specific field in the entry editing screen, and exploitation requires contributor or higher level privileges
  • Server-side request forgery (CWE-918)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N Base Score 9.2
    • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N Base Score 8.6
    • CVE-2025-36560
  • Improper output neutralization for logs (CWE-117)
    • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N Base Score 2.1
    • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Base Score 4.8
    • CVE-2025-41429

Impact

  • Any files on the server may be retrieved or deleted (CVE-2025-27566)
  • An arbitrary script may be executed on the web browser of the user who is logging in to the product (CVE-2025-32999)
  • Processing a specially crafted request may allow access to sensitive information (CVE-2025-36560)
  • The combination of these vulnerabilities may allow an attacker to hijack a legitimate user's session (CVE-2025-36560, CVE-2025-41429)

Solution

Update the Software
Update the software to the latest version according to the information provided by the developer.

Apply the workaround
The developer has also provided a workaround for CVE-2025-36560 and CVE-2025-41429.

For more information, refer to the information provided by the developer.

Vendor Status

Vendor Status Last Update Vendor Notes
appleple inc. Vulnerable 2025/05/14 appleple inc. website

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

CVE-2025-27566, CVE-2025-32999
haidv35 (Dinh Viet Hai) reported these vulnerabilities to the developer and coordinated. After the coordination was completed, haidv35 (Dinh Viet Hai) reported the case to JPCERT/CC to notify users of the solution through JVN.

CVE-2025-36560, CVE-2025-41429
vcth4nh from VCSLab of Viettel Cyber Security (Vu Chi Thanh) reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-27566
CVE-2025-32999
CVE-2025-36560
CVE-2025-41429
JVN iPedia