Description
TeamPass 2.1.27.36 allows any authenticated TeamPass user to trigger a PHP file include vulnerability via a crafted HTTP request with sources/users.queries.php newValue directory traversal.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2813 | TeamPass 2.1.27.36 allows any authenticated TeamPass user to trigger a PHP file include vulnerability via a crafted HTTP request with sources/users.queries.php newValue directory traversal. |
Github GHSA |
GHSA-6jf9-8m34-96w5 | TeamPass PHP arbitrary file include vulnerability |
References
| Link | Providers |
|---|---|
| https://github.com/nilsteampassnet/TeamPass/issues/2762 |
|
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T11:56:52.093Z
Reserved: 2020-04-29T00:00:00.000Z
Link: CVE-2020-12479
No data.
Status : Modified
Published: 2020-04-29T22:15:12.827
Modified: 2024-11-21T04:59:47.107
Link: CVE-2020-12479
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA