Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hangzhou Kuozhi Network Technology
Hangzhou Kuozhi Network Technology edusoho |
|
| Vendors & Products |
Hangzhou Kuozhi Network Technology
Hangzhou Kuozhi Network Technology edusoho |
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EduSoho versions prior to 22.4.7 contain an arbitrary file read vulnerability in the classroom-course-statistics export functionality. A remote, unauthenticated attacker can supply crafted path traversal sequences in the fileNames[] parameter to read arbitrary files from the server filesystem, including application configuration files such as config/parameters.yml that may contain secrets and database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2026-01-19 (UTC). | |
| Title | EduSoho < 22.4.7 Arbitrary File Read via classroom-course-statistics | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-22T18:31:38.631Z
Reserved: 2026-01-21T21:28:45.232Z
Link: CVE-2023-7335
Updated: 2026-01-22T18:31:30.559Z
Status : Deferred
Published: 2026-01-22T17:15:53.117
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-7335
No data.
OpenCVE Enrichment
Updated: 2026-01-23T10:27:17Z