Description
A Path traversal vulnerability in the file
download functionality was identified. This vulnerability allows
unauthenticated users to download arbitrary files, in the context of the
application server, from the Linux server.
Published: 2025-05-16
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Update to versions 5.4.12, 5.5.4, 5.6.3 or higher.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15430 A Path traversal vulnerability in the file download functionality was identified. This vulnerability allows unauthenticated users to download arbitrary files, in the context of the application server, from the Linux server.
References
History

Fri, 16 May 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 May 2025 12:30:00 +0000

Type Values Removed Values Added
Description A Path traversal vulnerability in the file download functionality was identified. This vulnerability allows unauthenticated users to download arbitrary files, in the context of the application server, from the Linux server.
Title Local file inclusion vulnerability in LIVE CONTRACT
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: cirosec

Published:

Updated: 2025-05-16T13:04:26.030Z

Reserved: 2025-03-14T12:24:17.830Z

Link: CVE-2025-2305

cve-icon Vulnrichment

Updated: 2025-05-16T13:04:22.444Z

cve-icon NVD

Status : Deferred

Published: 2025-05-16T13:15:52.063

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2305

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses