A vulnerability, which was classified as problematic, was found in ChestnutCMS up to 1.5.3. Affected is the function readFile of the file /dev-api/cms/file/read. The manipulation of the argument filePath leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
History

Mon, 14 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared 1000cms
1000cms chestnutcms
CPEs cpe:2.3:a:1000cms:chestnutcms:*:*:*:*:*:*:*:*
Vendors & Products 1000cms
1000cms chestnutcms

Fri, 28 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 28 Mar 2025 17:45:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as problematic, was found in ChestnutCMS up to 1.5.3. Affected is the function readFile of the file /dev-api/cms/file/read. The manipulation of the argument filePath leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Title ChestnutCMS read readFile path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-03-28T17:43:16.861Z

Reserved: 2025-03-28T11:35:04.005Z

Link: CVE-2025-2917

cve-icon Vulnrichment

Updated: 2025-03-28T17:43:13.348Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-28T18:15:17.253

Modified: 2025-04-14T13:53:30.877

Link: CVE-2025-2917

cve-icon Redhat

No data.