CVE Alert: CVE-2025-10468 – Beyaz Computer – CityPlus

CVE-2025-10468

HIGHNo exploitation known

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Beyaz Computer CityPlus allows Path Traversal.This issue affects CityPlus: before 24.29375.

CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Beyaz Computer
Product
CityPlus
Versions
0 lt 24.29375
CWE
CWE-22, CWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Published
2025-09-19T11:07:44.328Z
Updated
2025-09-19T11:22:35.519Z

AI Summary Analysis

Risk verdict

High risk from a remote path traversal vulnerability; currently no confirmed exploitation activity.

Why this matters

An unauthenticated attacker can remotely request the vulnerable component, potentially reading sensitive server files and configuration data. The confidentiality impact is high, creating a realistic risk of data disclosure and exposure of credentials or secrets if exposed via the affected paths.

Most likely attack path

Exploitation requires network access to the CityPlus interface, with no privileges or user interaction needed. An attacker can craft input parameters that are used to build file paths, exploiting low attack complexity to access restricted directories. Lateral movement is unlikely to be direct, but sensitive data access could enable further abuse or exfiltration.

Who is most exposed

Organisations running CityPlus in internet-facing or cloud-connected deployments, particularly where older builds or custom configurations are in use. On-premise installations with public endpoints are most at risk.

Detection ideas

  • Look for requests containing path traversal patterns (../, ..%2f, encoded slashes) targeting CityPlus endpoints.
  • Unusual or failed attempts to access restricted files or directories (e.g., hidden/config files) reflected as 403/500 responses.
  • Anomalous spikes in URL parameters or error logs tied to file-path inputs.
  • WAF or reverse proxy alerts for path traversal attempts.
  • Correlated log bursts from IPs unfamiliar to normal operation.

Mitigation and prioritisation

  • Apply patch to version 24.29375 or later; verify through staged testing before prod rollout.
  • Implement input validation and canonicalisation to normalise and reject traversal sequences; restrict file-system access to required paths only.
  • Enable strict allow-listing for file access and disable directory listing; enforce least-privilege service accounts.
  • Deploy WAF rules to block common path-traversal payloads and monitor for related attempts.
  • Schedule prompt remediation within the standard change window; document rollback and validation steps.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.