{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-4545","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-05-10T15:25:21.459Z","datePublished":"2025-05-11T19:31:04.417Z","dateUpdated":"2025-05-12T18:57:46.800Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-05-11T19:31:04.417Z"},"title":"CTCMS Content Management System File Tpl.php del path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"CTCMS","product":"Content Management System","versions":[{"version":"2.1.2","status":"affected"}],"modules":["File Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in CTCMS Content Management System 2.1.2. It has been classified as critical. Affected is the function del of the file ctcms\\apps\\controllers\\admin\\Tpl.php of the component File Handler. The manipulation of the argument File leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in CTCMS Content Management System 2.1.2 ausgemacht. Es geht dabei um die Funktion del der Datei ctcms\\apps\\controllers\\admin\\Tpl.php der Komponente File Handler. Mittels Manipulieren des Arguments File mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.5,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:P"}}],"timeline":[{"time":"2025-05-10T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-05-10T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-05-10T17:30:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"xiaoyang (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.308292","name":"VDB-308292 | CTCMS Content Management System File Tpl.php del path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.308292","name":"VDB-308292 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.566498","name":"Submit #566498 | https://www.ctcms.cn/ CTCMS Content Management System V2.1.2 Arbitrary File Deletion","tags":["third-party-advisory"]},{"url":"https://github.com/xiaoyangsec/ctcms/blob/main/CTCMS_Arbitrary_File_Deletion_Vulnerability_Authenticated.md","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/xiaoyangsec/ctcms/blob/main/CTCMS_Arbitrary_File_Deletion_Vulnerability_Authenticated.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-12T18:57:27.887105Z","id":"CVE-2025-4545","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-12T18:57:46.800Z"}}]}}