Ameeba Chat App store presentation
Download Ameeba Chat Today
Ameeba Blog Search

CVE-2025-45890: Critical Directory Traversal Vulnerability in Novel Plus Before V.5.1.0

Ameeba’s Mission: Safeguarding privacy by securing data and communication with our patented anonymization technology.

Overview

CVE-2025-45890 represents a severe directory traversal vulnerability in Novel Plus versions preceding v.5.1.0. A remote attacker can exploit this weakness to execute arbitrary code, potentially compromising the system and leaking sensitive data. This vulnerability matters significantly due to its high severity score and the potential for widespread data loss or unauthorized system access. As such, it is crucial for anyone using Novel Plus to understand this vulnerability and take immediate steps to mitigate its effects.

Vulnerability Summary

CVE ID: CVE-2025-45890
Severity: Critical (CVSS Score: 9.8)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise and potential data leakage

Affected Products

Ameeba Chat Icon Escape the Surveillance Era

Most apps won’t tell you the truth.
They’re part of the problem.

Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.

Ameeba Chat gives you a way out.

  • • No phone number
  • • No email
  • • No personal info
  • • Anonymous aliases
  • • End-to-end encrypted

Chat without a trace.

Product | Affected Versions

Novel Plus | Before v.5.1.0

How the Exploit Works

The exploit leverages a directory traversal vulnerability in Novel Plus. Specifically, the vulnerability lies in the improper handling of the ‘filePath’ parameter. By sending specially crafted requests, an attacker can manipulate the ‘filePath’ parameter to traverse directories and execute arbitrary code remotely. This exploitation can lead to unauthorized system access and potential data leakage.

Conceptual Example Code

A conceptual example of how this vulnerability might be exploited might look like this:

GET /download?filePath=../../../../etc/passwd HTTP/1.1
Host: target.example.com

In this example, the attacker uses the ‘filePath’ parameter to traverse to the ‘etc/passwd’ directory, a common target as it stores user account details. A successful exploit could allow the attacker to gain unauthorized access to sensitive data.

Mitigation

To mitigate this vulnerability, users are advised to apply the vendor patch immediately. If unable to apply the patch right away, the use of a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) can serve as a temporary mitigation measure. These tools can help identify and block malicious requests that attempt to exploit this vulnerability. However, they should not replace the long-term solution of patching the affected software.

Talk freely. Stay anonymous with Ameeba Chat.

Disclaimer:

The information and code presented in this article are provided for educational and defensive cybersecurity purposes only. Any conceptual or pseudocode examples are simplified representations intended to raise awareness and promote secure development and system configuration practices.

Do not use this information to attempt unauthorized access or exploit vulnerabilities on systems that you do not own or have explicit permission to test.

Ameeba and its authors do not endorse or condone malicious behavior and are not responsible for misuse of the content. Always follow ethical hacking guidelines, responsible disclosure practices, and local laws.
Ameeba Chat