Overview
A critical vulnerability, CVE-2025-9639, has been identified in the QbiCRMGateway developed by Ai3. This vulnerability potentially allows unauthorized remote attackers to exploit a Relative Path Traversal flaw in the system, thus gaining access to and downloading arbitrary system files. The implications of this vulnerability are severe, with potential system compromise and data leakage being the key concerns.
Vulnerability Summary
CVE ID: CVE-2025-9639
Severity: High (CVSS: 7.5)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Unauthorized access to sensitive data, potential system compromise
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
QbiCRMGateway by Ai3 | All versions prior to the security patch
How the Exploit Works
An attacker exploiting this vulnerability can manipulate the file path input to QbiCRMGateway, utilizing a Relative Path Traversal technique to navigate the system’s directory structure. This can be done remotely and without authentication, allowing the attacker to access and download arbitrary files from the system, potentially compromising sensitive data and threatening the integrity of the system.
Conceptual Example Code
The following demonstrates a conceptual HTTP request exploiting this vulnerability:
GET /path/to/file/../../etc/passwd HTTP/1.1
Host: vulnerable.website.com
In this example, an attacker is attempting to download the ‘/etc/passwd’ file, a sensitive file in UNIX-based systems, via Path Traversal. The ‘../’ components in the path are used to move up in the directory structure.
Mitigation
It is strongly recommended to apply the vendor’s security patch as soon as possible. In the interim, it may be effective to employ a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) to detect and block attempts to exploit this vulnerability.
