Rhymix v2.1.22 was discovered to contain an arbitrary file deletion vulnerability via the procFileAdminEditImage method in /file/file.admin.controller.php.
References
Link | Resource |
---|---|
http://rhymix.com | Broken Link |
https://gist.github.com/chao112122/536a55fece5f578b90cee2c841eecdce | Third Party Advisory |
https://github.com/rhymix/rhymix | Product |
Configurations
History
17 Jun 2025, 14:12
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:rhymix:rhymix:2.1.22:*:*:*:*:*:*:* | |
First Time |
Rhymix rhymix
Rhymix |
|
Summary |
|
|
References | () http://rhymix.com - Broken Link | |
References | () https://gist.github.com/chao112122/536a55fece5f578b90cee2c841eecdce - Third Party Advisory | |
References | () https://github.com/rhymix/rhymix - Product |
05 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-922 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.7 |
05 May 2025, 17:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-05 17:18
Updated : 2025-06-17 14:12
NVD link : CVE-2025-45242
Mitre link : CVE-2025-45242
CVE.ORG link : CVE-2025-45242
JSON object : View
Products Affected
rhymix
- rhymix
CWE
CWE-922
Insecure Storage of Sensitive Information