Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-15442 | PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory. |
Fri, 16 May 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 May 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory. | |
| Title | Path Traversal vulnerability in PNETLab | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-05-16T12:59:59.664Z
Reserved: 2025-04-16T08:38:09.207Z
Link: CVE-2025-40629
Updated: 2025-05-16T12:59:56.553Z
Status : Deferred
Published: 2025-05-16T13:15:52.543
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-40629
No data.
OpenCVE Enrichment
No data.
EUVD