Metrics
Affected Vendors & Products
Mon, 14 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
1000cms
1000cms chestnutcms |
|
CPEs | cpe:2.3:a:1000cms:chestnutcms:*:*:*:*:*:*:*:* | |
Vendors & Products |
1000cms
1000cms chestnutcms |
Fri, 28 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
Fri, 28 Mar 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as problematic, was found in ChestnutCMS up to 1.5.3. Affected is the function readFile of the file /dev-api/cms/file/read. The manipulation of the argument filePath leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
Title | ChestnutCMS read readFile path traversal | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-03-28T17:43:16.861Z
Reserved: 2025-03-28T11:35:04.005Z
Link: CVE-2025-2917

Updated: 2025-03-28T17:43:13.348Z

Status : Analyzed
Published: 2025-03-28T18:15:17.253
Modified: 2025-04-14T13:53:30.877
Link: CVE-2025-2917

No data.