cvelist/2025/27xxx/CVE-2025-27566.json
2025-05-19 09:00:34 +00:00

83 lines
2.9 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2025-27566",
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Path traversal vulnerability exists in a-blog cms versions prior to Ver. 3.1.43 and versions prior to Ver. 3.0.47. This is an issue with insufficient path validation in the backup feature, and exploitation requires the administrator privilege. If this vulnerability is exploited, a remote authenticated attacker with the administrator privilege may obtain or delete any file on the server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper limitation of a pathname to a restricted directory ('Path Traversal')",
"cweId": "CWE-22"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "appleple inc.",
"product": {
"product_data": [
{
"product_name": "a-blog cms",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to Ver. 3.1.43 (Ver. 3.1.x series)"
},
{
"version_affected": "=",
"version_value": "prior to Ver. 3.0.47 (Ver. 3.0.x series)"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://developer.a-blogcms.jp/blog/news/JVNVU-90760614.html",
"refsource": "MISC",
"name": "https://developer.a-blogcms.jp/blog/news/JVNVU-90760614.html"
},
{
"url": "https://jvn.jp/en/vu/JVNVU90760614/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU90760614/"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "LOW",
"baseScore": 3.8,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"
}
]
}
}