{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-58312","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-12-11T17:36:04.192Z","datePublished":"2025-12-11T21:42:57.485Z","dateUpdated":"2026-04-07T14:08:53.951Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"xbtitFM","vendor":"xbtitfm","versions":[{"status":"affected","version":"4.1.18"}]}],"credits":[{"lang":"en","type":"finder","value":"xbtitFM Team"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>xbtitFM 4.1.18 contains a path traversal vulnerability that allows unauthenticated attackers to access sensitive system files by manipulating URL parameters. Attackers can exploit directory traversal techniques to read critical system files like using encoded path traversal characters in HTTP requests.</p>"}],"value":"xbtitFM 4.1.18 contains a path traversal vulnerability that allows unauthenticated attackers to access sensitive system files by manipulating URL parameters. Attackers can exploit directory traversal techniques to read critical system files like using encoded path traversal characters in HTTP requests."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.7,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-04-07T14:08:53.951Z"},"references":[{"name":"ExploitDB-51909","tags":["exploit"],"url":"https://www.exploit-db.com/exploits/51909"},{"name":"Official Vendor Homepage","tags":["product"],"url":"https://xbtitfm.eu"},{"name":"VulnCheck Advisory: xbtitFM 4.1.18 Unauthenticated Path Traversal in nfogen.php","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/xbtitfm-unauthenticated-path-traversal-in-nfogenphp"}],"source":{"discovery":"UNKNOWN"},"title":"xbtitFM 4.1.18 Unauthenticated Path Traversal in nfogen.php","x_generator":{"engine":"vulncheck"},"datePublic":"2024-03-18T00:00:00.000Z"},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-16T16:20:33.915175Z","id":"CVE-2024-58312","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-16T16:31:09.963Z"}}]}}