{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1106","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-02-07T09:46:50.063Z","datePublished":"2025-02-07T18:31:04.414Z","dateUpdated":"2025-02-12T20:51:41.660Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-02-07T18:31:04.414Z"},"title":"CmsEasy database_admin.php restore_action path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"n/a","product":"CmsEasy","versions":[{"version":"7.7.7.9","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in CmsEasy 7.7.7.9. This affects the function deletedir_action/restore_action in the library lib/admin/database_admin.php. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in CmsEasy 7.7.7.9 entdeckt. Sie wurde als kritisch eingestuft. Betroffen hiervon ist die Funktion deletedir_action/restore_action in der Bibliothek lib/admin/database_admin.php. Durch das Manipulieren mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.5,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:P"}}],"timeline":[{"time":"2025-02-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-02-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-02-07T10:52:01.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Rorochan (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.294939","name":"VDB-294939 | CmsEasy database_admin.php restore_action path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.294939","name":"VDB-294939 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.491518","name":"Submit #491518 | 中国吉林省四平市九州易通科技有限公司 SiPing Shi JiuZhou Yitong KeJi YouXianGongSi  CmsEasy V7.7.7.9 Path Traversal","tags":["third-party-advisory"]},{"url":"https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasyPathTraversal-2.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-1106","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2025-02-07T19:03:53.560448Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-12T20:51:41.660Z"}}]}}