FKIE_CVE-2025-2305
Vulnerability from fkie_nvd - Published: 2025-05-16 13:15 - Updated: 2025-05-16 14:42
Severity ?
Summary
A Path traversal vulnerability in the file
download functionality was identified. This vulnerability allows
unauthenticated users to download arbitrary files, in the context of the
application server, from the Linux server.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Path traversal vulnerability in the file\ndownload functionality was identified. This vulnerability allows\nunauthenticated users to download arbitrary files, in the context of the\napplication server, from the Linux server."
},
{
"lang": "es",
"value": "Se identific\u00f3 una vulnerabilidad de path traversal en la funcionalidad de descarga de archivos. Esta vulnerabilidad permite a usuarios no autenticados descargar archivos arbitrarios, en el contexto del servidor de aplicaciones, desde el servidor Linux."
}
],
"id": "CVE-2025-2305",
"lastModified": "2025-05-16T14:42:18.700",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674",
"type": "Secondary"
}
]
},
"published": "2025-05-16T13:15:52.063",
"references": [
{
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674",
"url": "https://www.cirosec.de/sa/sa-2025-003"
}
],
"sourceIdentifier": "a341c0d1-ebf7-493f-a84e-38cf86618674",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…