2025-02-16 05:03:57 +00:00
{
"id" : "CVE-2025-1335" ,
"sourceIdentifier" : "cna@vuldb.com" ,
"published" : "2025-02-16T04:15:23.230" ,
2025-03-16 03:03:50 +00:00
"lastModified" : "2025-02-28T19:56:39.220" ,
2025-02-28 21:03:47 +00:00
"vulnStatus" : "Analyzed" ,
2025-02-16 05:03:57 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability, which was classified as problematic, was found in CmsEasy 7.7.7.9. Affected is the function deleteimg_action in the library lib/admin/file_admin.php. The manipulation of the argument imgname leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
2025-02-23 03:03:59 +00:00
} ,
{
"lang" : "es" ,
"value" : "En CmsEasy 7.7.7.9 se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica. La funci\u00f3n deleteimg_action en la librer\u00eda lib/admin/file_admin.php est\u00e1 afectada. La manipulaci\u00f3n del argumento imgname provoca un path traversal. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
2025-02-16 05:03:57 +00:00
}
] ,
"metrics" : {
"cvssMetricV40" : [
{
"source" : "cna@vuldb.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "4.0" ,
"vectorString" : "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" ,
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"attackRequirements" : "NONE" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
2025-02-28 21:03:47 +00:00
"vulnConfidentialityImpact" : "LOW" ,
"vulnIntegrityImpact" : "NONE" ,
"vulnAvailabilityImpact" : "NONE" ,
"subConfidentialityImpact" : "NONE" ,
"subIntegrityImpact" : "NONE" ,
"subAvailabilityImpact" : "NONE" ,
2025-02-16 05:03:57 +00:00
"exploitMaturity" : "NOT_DEFINED" ,
2025-02-28 21:03:47 +00:00
"confidentialityRequirement" : "NOT_DEFINED" ,
"integrityRequirement" : "NOT_DEFINED" ,
"availabilityRequirement" : "NOT_DEFINED" ,
2025-02-16 05:03:57 +00:00
"modifiedAttackVector" : "NOT_DEFINED" ,
"modifiedAttackComplexity" : "NOT_DEFINED" ,
"modifiedAttackRequirements" : "NOT_DEFINED" ,
"modifiedPrivilegesRequired" : "NOT_DEFINED" ,
"modifiedUserInteraction" : "NOT_DEFINED" ,
2025-02-28 21:03:47 +00:00
"modifiedVulnConfidentialityImpact" : "NOT_DEFINED" ,
"modifiedVulnIntegrityImpact" : "NOT_DEFINED" ,
"modifiedVulnAvailabilityImpact" : "NOT_DEFINED" ,
"modifiedSubConfidentialityImpact" : "NOT_DEFINED" ,
"modifiedSubIntegrityImpact" : "NOT_DEFINED" ,
"modifiedSubAvailabilityImpact" : "NOT_DEFINED" ,
"Safety" : "NOT_DEFINED" ,
"Automatable" : "NOT_DEFINED" ,
"Recovery" : "NOT_DEFINED" ,
2025-02-16 05:03:57 +00:00
"valueDensity" : "NOT_DEFINED" ,
"vulnerabilityResponseEffort" : "NOT_DEFINED" ,
"providerUrgency" : "NOT_DEFINED"
}
}
] ,
"cvssMetricV31" : [
{
"source" : "cna@vuldb.com" ,
2025-02-28 21:03:47 +00:00
"type" : "Secondary" ,
2025-02-16 05:03:57 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" ,
"baseScore" : 4.3 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 1.4
2025-02-28 21:03:47 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" ,
"baseScore" : 8.1 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.2
2025-02-16 05:03:57 +00:00
}
] ,
"cvssMetricV2" : [
{
"source" : "cna@vuldb.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N" ,
"baseScore" : 4.0 ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE"
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "cna@vuldb.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-22"
}
]
}
] ,
2025-02-28 21:03:47 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C47FE864-5B8E-428F-80DC-AA29EDB454DA"
}
]
}
]
}
] ,
2025-02-16 05:03:57 +00:00
"references" : [
{
"url" : "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-v7.7.7.9-PathTraversal-2-2-1.md" ,
2025-02-28 21:03:47 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2025-02-16 05:03:57 +00:00
} ,
{
"url" : "https://vuldb.com/?ctiid.295950" ,
2025-02-28 21:03:47 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Permissions Required" ,
"VDB Entry"
]
2025-02-16 05:03:57 +00:00
} ,
{
"url" : "https://vuldb.com/?id.295950" ,
2025-02-28 21:03:47 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Permissions Required" ,
"VDB Entry"
]
2025-02-16 05:03:57 +00:00
} ,
{
"url" : "https://vuldb.com/?submit.493682" ,
2025-02-28 21:03:47 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
2025-02-16 05:03:57 +00:00
}
]
}