Ameeba Security Research

Defensive CVE and exploit intelligence

Ameeba Blog Search
TRENDING · 1 WEEK
Attack Vector
Vendor
Severity

CVE-2025-45890: Critical Directory Traversal Vulnerability in Novel Plus Before V.5.1.0

Overview

CVE-2025-45890 represents a severe directory traversal vulnerability in Novel Plus versions preceding v.5.1.0. A remote attacker can exploit this weakness to execute arbitrary code, potentially compromising the system and leaking sensitive data. This vulnerability matters significantly due to its high severity score and the potential for widespread data loss or unauthorized system access. As such, it is crucial for anyone using Novel Plus to understand this vulnerability and take immediate steps to mitigate its effects.

Vulnerability Summary

CVE ID: CVE-2025-45890
Severity: Critical (CVSS Score: 9.8)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise and potential data leakage

Affected Products

Ameeba Chat Icon A new way to communicate

Ameeba Chat is built on encrypted identity, not personal profiles.

Message, call, share files, and coordinate with identities kept separate.

  • • Encrypted identity
  • • Ameeba Chat authenticates access
  • • Aliases and categories
  • • End-to-end encrypted chat, calls, and files
  • • Secure notes for sensitive information

Private communication, rethought.

Product | Affected Versions

Novel Plus | Before v.5.1.0

How the Exploit Works

The exploit leverages a directory traversal vulnerability in Novel Plus. Specifically, the vulnerability lies in the improper handling of the ‘filePath’ parameter. By sending specially crafted requests, an attacker can manipulate the ‘filePath’ parameter to traverse directories and execute arbitrary code remotely. This exploitation can lead to unauthorized system access and potential data leakage.

Conceptual Example Code

A conceptual example of how this vulnerability might be exploited might look like this:

GET /download?filePath=../../../../etc/passwd HTTP/1.1
Host: target.example.com

In this example, the attacker uses the ‘filePath’ parameter to traverse to the ‘etc/passwd’ directory, a common target as it stores user account details. A successful exploit could allow the attacker to gain unauthorized access to sensitive data.

Mitigation

To mitigate this vulnerability, users are advised to apply the vendor patch immediately. If unable to apply the patch right away, the use of a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) can serve as a temporary mitigation measure. These tools can help identify and block malicious requests that attempt to exploit this vulnerability. However, they should not replace the long-term solution of patching the affected software.

Want to discuss this further? Join the Ameeba Cybersecurity Group Chat.

Disclaimer:

The information and code presented in this article are provided for educational and defensive cybersecurity purposes only. Any conceptual or pseudocode examples are simplified representations intended to raise awareness and promote secure development and system configuration practices.

Do not use this information to attempt unauthorized access or exploit vulnerabilities on systems that you do not own or have explicit permission to test.

Ameeba and its authors do not endorse or condone malicious behavior and are not responsible for misuse of the content. Always follow ethical hacking guidelines, responsible disclosure practices, and local laws.
Ameeba Chat