Overview
CVE-2025-45890 represents a severe directory traversal vulnerability in Novel Plus versions preceding v.5.1.0. A remote attacker can exploit this weakness to execute arbitrary code, potentially compromising the system and leaking sensitive data. This vulnerability matters significantly due to its high severity score and the potential for widespread data loss or unauthorized system access. As such, it is crucial for anyone using Novel Plus to understand this vulnerability and take immediate steps to mitigate its effects.
Vulnerability Summary
CVE ID: CVE-2025-45890
Severity: Critical (CVSS Score: 9.8)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise and potential data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Novel Plus | Before v.5.1.0
How the Exploit Works
The exploit leverages a directory traversal vulnerability in Novel Plus. Specifically, the vulnerability lies in the improper handling of the ‘filePath’ parameter. By sending specially crafted requests, an attacker can manipulate the ‘filePath’ parameter to traverse directories and execute arbitrary code remotely. This exploitation can lead to unauthorized system access and potential data leakage.
Conceptual Example Code
A conceptual example of how this vulnerability might be exploited might look like this:
GET /download?filePath=../../../../etc/passwd HTTP/1.1
Host: target.example.com
In this example, the attacker uses the ‘filePath’ parameter to traverse to the ‘etc/passwd’ directory, a common target as it stores user account details. A successful exploit could allow the attacker to gain unauthorized access to sensitive data.
Mitigation
To mitigate this vulnerability, users are advised to apply the vendor patch immediately. If unable to apply the patch right away, the use of a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) can serve as a temporary mitigation measure. These tools can help identify and block malicious requests that attempt to exploit this vulnerability. However, they should not replace the long-term solution of patching the affected software.