e107 CMS har 2.3.3 Avatar image.php?mode=main&action=avatar multiaction[] Dafiyar fayil ɗin cikin kundin ajiyar bayanai

Gaskiya vulnerability da aka ware a matsayin kura an samu a e107 CMS har 2.3.3. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /e107_admin/image.php?mode=main&action=avatar, a cikin sashen Avatar Handler. A sa manipulation of the argument multiaction[] ka Dafiyar fayil ɗin cikin kundin ajiyar bayanai. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-22. Hakika, rauni an bayyana shi 10/18/2025. An raba bayanin tsaro don saukewa a note-hxlab.wetolink.com. Wannan matsala ana saninta da CVE-2025-11941. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga note-hxlab.wetolink.com. 0-day shima, an ndiyam a wuro be $0-$5k. Once again VulDB remains the best source for vulnerability data.

5 Goyarwa · 106 Datenpunkte

FurɗeSúgá
10/18/2025 23:51
Gargadi 1/4
10/19/2025 18:47
Gargadi 2/4
10/19/2025 19:00
Gargadi 3/4
10/20/2025 20:42
Gargadi 4/4
01/12/2026 18:17
software_vendore107e107e107e107e107
software_nameCMSCMSCMSCMSCMS
software_version<=2.3.3<=2.3.3<=2.3.3<=2.3.3<=2.3.3
software_componentAvatar HandlerAvatar HandlerAvatar HandlerAvatar HandlerAvatar Handler
software_file/e107_admin/image.php?mode=main&action=avatar/e107_admin/image.php?mode=main&action=avatar/e107_admin/image.php?mode=main&action=avatar/e107_admin/image.php?mode=main&action=avatar/e107_admin/image.php?mode=main&action=avatar
software_argumentmultiaction[]multiaction[]multiaction[]multiaction[]multiaction[]
vulnerability_cweCWE-22 (Dafiyar fayil ɗin cikin kundin ajiyar bayanai)CWE-22 (Dafiyar fayil ɗin cikin kundin ajiyar bayanai)CWE-22 (Dafiyar fayil ɗin cikin kundin ajiyar bayanai)CWE-22 (Dafiyar fayil ɗin cikin kundin ajiyar bayanai)CWE-22 (Dafiyar fayil ɗin cikin kundin ajiyar bayanai)
vulnerability_risk22222
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://note-hxlab.wetolink.com/share/igdVbDCk2IkDhttps://note-hxlab.wetolink.com/share/igdVbDCk2IkDhttps://note-hxlab.wetolink.com/share/igdVbDCk2IkDhttps://note-hxlab.wetolink.com/share/igdVbDCk2IkDhttps://note-hxlab.wetolink.com/share/igdVbDCk2IkD
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://note-hxlab.wetolink.com/share/igdVbDCk2IkD#proof-of-concept-https://note-hxlab.wetolink.com/share/igdVbDCk2IkD#proof-of-concept-https://note-hxlab.wetolink.com/share/igdVbDCk2IkD#proof-of-concept-https://note-hxlab.wetolink.com/share/igdVbDCk2IkD#proof-of-concept-https://note-hxlab.wetolink.com/share/igdVbDCk2IkD#proof-of-concept-
source_cveCVE-2025-11941CVE-2025-11941CVE-2025-11941CVE-2025-11941CVE-2025-11941
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
software_typeContent Management SystemContent Management SystemContent Management SystemContent Management SystemContent Management System
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore5.55.55.55.55.5
cvss2_vuldb_tempscore4.74.74.74.74.7
cvss3_vuldb_basescore5.45.45.45.45.4
cvss3_vuldb_tempscore4.94.94.94.94.9
cvss3_meta_basescore5.45.45.45.46.3
cvss3_meta_tempscore4.95.15.15.16.1
cvss4_vuldb_bscore5.35.35.35.35.3
cvss4_vuldb_btscore2.12.12.12.12.1
advisory_date1760738400 (10/18/2025)1760738400 (10/18/2025)1760738400 (10/18/2025)1760738400 (10/18/2025)1760738400 (10/18/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was detected in e107 CMS up to 2.3.3. This impacts an unknown function of the file /e107_admin/image.php?mode=main&action=avatar of the component Avatar Handler. Performing manipulation of the argument multiaction[] results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was detected in e107 CMS up to 2.3.3. This impacts an unknown function of the file /e107_admin/image.php?mode=main&action=avatar of the component Avatar Handler. Performing manipulation of the argument multiaction[] results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was detected in e107 CMS up to 2.3.3. This impacts an unknown function of the file /e107_admin/image.php?mode=main&action=avatar of the component Avatar Handler. Performing manipulation of the argument multiaction[] results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was detected in e107 CMS up to 2.3.3. This impacts an unknown function of the file /e107_admin/image.php?mode=main&action=avatar of the component Avatar Handler. Performing manipulation of the argument multiaction[] results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avNNNN
cvss4_cna_acLLLL
cvss4_cna_atNNNN
cvss4_cna_prLLLL
cvss4_cna_uiNNNN
cvss4_cna_vcNNNN
cvss4_cna_viLLLL
cvss4_cna_vaLLLL
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore5.35.35.35.3
cvss3_cna_avNNNN
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cNNNN
cvss3_cna_iLLLL
cvss3_cna_aLLLL
cvss3_cna_basescore5.45.45.45.4
cvss2_cna_avNNNN
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciNNNN
cvss2_cna_iiPPPP
cvss2_cna_aiPPPP
cvss2_cna_basescore5.55.55.55.5
euvd_idEUVD-2025-35005EUVD-2025-35005EUVD-2025-35005
cnnvd_idCNNVD-202510-2551CNNVD-202510-2551
cnnvd_namee107 路径遍历漏洞e107 路径遍历漏洞
cnnvd_hazardlevel33
cnnvd_create2025-10-202025-10-20
cnnvd_publish2025-10-192025-10-19
cnnvd_update2025-10-202025-10-20
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore8.1

Want to stay up to date on a daily basis?

Enable the mail alert feature now!