{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1335","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-02-15T14:36:02.968Z","datePublished":"2025-02-16T04:00:15.125Z","dateUpdated":"2025-02-18T21:32:38.225Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-02-16T04:00:15.125Z"},"title":"CmsEasy file_admin.php deleteimg_action path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"n/a","product":"CmsEasy","versions":[{"version":"7.7.7.9","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in CmsEasy 7.7.7.9. Affected is the function deleteimg_action in the library lib/admin/file_admin.php. The manipulation of the argument imgname leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in CmsEasy 7.7.7.9 gefunden. Sie wurde als problematisch eingestuft. Es betrifft die Funktion deleteimg_action in der Bibliothek lib/admin/file_admin.php. Mittels Manipulieren des Arguments imgname mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N"}}],"timeline":[{"time":"2025-02-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-02-15T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-02-15T15:41:08.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Rorochan (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.295950","name":"VDB-295950 | CmsEasy file_admin.php deleteimg_action path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.295950","name":"VDB-295950 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.493682","name":"Submit #493682 | 中国吉林省四平市九州易通科技有限公司 SiPing Shi JiuZhou Yitong KeJi YouXianGongSi CmsEasy V7.7.7.9 Path Traversal","tags":["third-party-advisory"]},{"url":"https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-v7.7.7.9-PathTraversal-2-2-1.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-18T21:32:26.562714Z","id":"CVE-2025-1335","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-18T21:32:38.225Z"}}]}}