Description
Barracuda products, confirmed in Spam & Virus Firewall, SSL VPN, and Web Application Firewall versions prior to October 2010, contain a path traversal vulnerability in the view_help.cgi endpoint. The locale parameter fails to properly sanitize user input, allowing attackers to inject traversal sequences and null-byte terminators to access arbitrary files on the underlying system. By exploiting this flaw, unauthenticated remote attackers can retrieve sensitive configuration files such as /mail/snapshot/config.snapshot, potentially exposing credentials, internal settings, and other critical data.
Published: 2025-08-21
Score: 8.7 High
EPSS: 55.3% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2010-5318 Barracuda products, confirmed in Spam & Virus Firewall, SSL VPN, and Web Application Firewall versions prior to October 2010, contain a path traversal vulnerability in the view_help.cgi endpoint. The locale parameter fails to properly sanitize user input, allowing attackers to inject traversal sequences and null-byte terminators to access arbitrary files on the underlying system. By exploiting this flaw, unauthenticated remote attackers can retrieve sensitive configuration files such as /mail/snapshot/config.snapshot, potentially exposing credentials, internal settings, and other critical data.
History

Thu, 20 Nov 2025 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Barracuda vpn Client
CPEs cpe:2.3:a:barracuda:vpn_client:-:*:*:*:*:*:*:*
cpe:2.3:a:barracuda:web_application_firewall:*:*:*:*:*:*:*:*
cpe:2.3:a:barracuda:web_application_firewall:-:*:*:*:*:*:*:*
Vendors & Products Barracuda vpn Client

Sat, 23 Aug 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Barracuda
Barracuda web Application Firewall
Barracudanetworks
Barracudanetworks barracuda Ssl Vpn
Barracudanetworks spam & Virus Firewall 600
Vendors & Products Barracuda
Barracuda web Application Firewall
Barracudanetworks
Barracudanetworks barracuda Ssl Vpn
Barracudanetworks spam & Virus Firewall 600

Fri, 22 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Description Barracuda products, confirmed in Spam & Virus Firewall, SSL VPN, and Web Application Firewall versions prior to October 2010, contain a path traversal vulnerability in the view_help.cgi endpoint. The locale parameter fails to properly sanitize user input, allowing attackers to inject traversal sequences and null-byte terminators to access arbitrary files on the underlying system. By exploiting this flaw, unauthenticated remote attackers can retrieve sensitive configuration files such as /mail/snapshot/config.snapshot, potentially exposing credentials, internal settings, and other critical data.
Title Barracuda Spam & Virus Firewall "locale" Path Traversal
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Barracuda Vpn Client Web Application Firewall
Barracudanetworks Barracuda Ssl Vpn Spam & Virus Firewall 600
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-15T11:13:31.357Z

Reserved: 2025-08-20T18:00:00.783Z

Link: CVE-2010-20109

cve-icon Vulnrichment

Updated: 2025-08-22T14:02:39.692Z

cve-icon NVD

Status : Deferred

Published: 2025-08-21T20:15:30.870

Modified: 2026-04-15T00:35:42.020

Link: CVE-2010-20109

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-23T11:53:18Z

Weaknesses