Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 04 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zdir Pro
Zdir Pro zdir Pro |
|
| Vendors & Products |
Zdir Pro
Zdir Pro zdir Pro |
Wed, 04 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zdir
Zdir zdir |
|
| CPEs | cpe:2.3:a:zdir:zdir:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zdir
Zdir zdir |
Wed, 04 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| Metrics |
cvssV3_1
|
Tue, 03 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability exists in the ZIP extraction API of Zdir Pro 4.x. When a crafted ZIP archive is processed by the backend at /api/extract, files may be written outside the intended directory, leading to arbitrary file overwrite and potentially remote code execution | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-04T14:36:39.595Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-66945
Updated: 2026-03-04T14:36:32.303Z
Status : Analyzed
Published: 2026-03-03T20:16:44.187
Modified: 2026-03-04T17:50:01.217
Link: CVE-2025-66945
No data.
OpenCVE Enrichment
Updated: 2026-03-04T21:04:22Z