download functionality was identified. This vulnerability allows
unauthenticated users to download arbitrary files, in the context of the
application server, from the Linux server.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Update to versions 5.4.12, 5.5.4, 5.6.3 or higher.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-15430 | A Path traversal vulnerability in the file download functionality was identified. This vulnerability allows unauthenticated users to download arbitrary files, in the context of the application server, from the Linux server. |
| Link | Providers |
|---|---|
| https://www.cirosec.de/sa/sa-2025-003 |
|
Fri, 16 May 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 May 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Path traversal vulnerability in the file download functionality was identified. This vulnerability allows unauthenticated users to download arbitrary files, in the context of the application server, from the Linux server. | |
| Title | Local file inclusion vulnerability in LIVE CONTRACT | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: cirosec
Published:
Updated: 2025-05-16T13:04:26.030Z
Reserved: 2025-03-14T12:24:17.830Z
Link: CVE-2025-2305
Updated: 2025-05-16T13:04:22.444Z
Status : Deferred
Published: 2025-05-16T13:15:52.063
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-2305
No data.
OpenCVE Enrichment
No data.
EUVD