{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1336","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-02-15T14:36:05.992Z","datePublished":"2025-02-16T09:00:14.232Z","dateUpdated":"2025-02-18T16:12:03.784Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-02-16T09:00:14.232Z"},"title":"CmsEasy image_admin.php deleteimg_action path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"n/a","product":"CmsEasy","versions":[{"version":"7.7.7.9","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in CmsEasy 7.7.7.9 and classified as problematic. Affected by this vulnerability is the function deleteimg_action in the library lib/admin/image_admin.php. The manipulation of the argument imgname leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In CmsEasy 7.7.7.9 wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Das betrifft die Funktion deleteimg_action in der Bibliothek lib/admin/image_admin.php. Durch das Manipulieren des Arguments imgname mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N"}}],"timeline":[{"time":"2025-02-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-02-15T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-02-15T15:41:12.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Rorochan (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.295951","name":"VDB-295951 | CmsEasy image_admin.php deleteimg_action path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.295951","name":"VDB-295951 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.493685","name":"Submit #493685 | 四平市九州易通科技有限公司 Siping Jiuzhou Yitong Technology Co., Ltd. CmsEasy V7.7.7.9 Path Traversal","tags":["third-party-advisory"]},{"url":"https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-v7.7.7.9-PathTraversal-2-2-2.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-18T16:11:45.084274Z","id":"CVE-2025-1336","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-18T16:12:03.784Z"}}]}}