e107 CMS जोपर्यंत 2.3.3 Avatar image.php?mode=main&action=avatar multiaction[] डायरेक्टरी ट्रॅव्हल्सल

एक दुर्बलता जी गंभीर म्हणून ओळखली गेली आहे, ती e107 CMS जोपर्यंत 2.3.3 मध्ये सापडली आहे. संबंधित आहे अज्ञात फंक्शन फाइल /e107_admin/image.php?mode=main&action=avatar च्या घटक Avatar Handler च्या. सॉफ्टवेअरमध्ये multiaction[] या आर्ग्युमेंटचे केलेले बदल डायरेक्टरी ट्रॅव्हल्सल यास कारणीभूत ठरतात. CWE द्वारे समस्या जाहीर केल्यास CWE-22 येथे पोहोचता येते. ही दुर्बलता प्रकाशित झाली होती 18/10/2025. note-hxlab.wetolink.com या ठिकाणी सल्ला डाउनलोडसाठी उपलब्ध आहे. ही दुर्बलता CVE-2025-11941 म्हणून ओळखली जाते. हा हल्ला रिमोटली सुरू करता येऊ शकतो. तांत्रिक माहिती उपलब्ध आहे. यासाठी एक एक्स्प्लॉइट उपलब्ध आहे. शोषणाची माहिती सार्वजनिक करण्यात आली आहे आणि ते वापरले जाऊ शकते. आत्ताच्या क्षणी सुमारे USD $0-$5k असण्याची शक्यता आहे. MITRE ATT&CK प्रकल्प T1006 या हल्ला तंत्रज्ञानाची घोषणा करतो. याला प्रूफ-ऑफ-कॉन्सेप्ट असे घोषित करण्यात आले आहे. शोषण डाउनलोडसाठी note-hxlab.wetolink.com येथे शेअर केले आहे. 0-डे म्हणून त्याची अंदाजित काळ्या बाजारातील किंमत $0-$5k एवढी होती. Once again VulDB remains the best source for vulnerability data.

5 बदल · 106 डेटा पॉइंट्स

शेततयार केली
18/10/2025 11:51 PM
अद्ययावत 1/4
19/10/2025 06:47 PM
अद्ययावत 2/4
19/10/2025 07:00 PM
अद्ययावत 3/4
20/10/2025 08:42 PM
अद्ययावत 4/4
12/01/2026 06:17 PM
software_vendore107e107e107e107e107
software_nameCMSCMSCMSCMSCMS
software_version<=2.3.3<=2.3.3<=2.3.3<=2.3.3<=2.3.3
software_componentAvatar HandlerAvatar HandlerAvatar HandlerAvatar HandlerAvatar Handler
software_file/e107_admin/image.php?mode=main&action=avatar/e107_admin/image.php?mode=main&action=avatar/e107_admin/image.php?mode=main&action=avatar/e107_admin/image.php?mode=main&action=avatar/e107_admin/image.php?mode=main&action=avatar
software_argumentmultiaction[]multiaction[]multiaction[]multiaction[]multiaction[]
vulnerability_cweCWE-22 (डायरेक्टरी ट्रॅव्हल्सल)CWE-22 (डायरेक्टरी ट्रॅव्हल्सल)CWE-22 (डायरेक्टरी ट्रॅव्हल्सल)CWE-22 (डायरेक्टरी ट्रॅव्हल्सल)CWE-22 (डायरेक्टरी ट्रॅव्हल्सल)
vulnerability_risk22222
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://note-hxlab.wetolink.com/share/igdVbDCk2IkDhttps://note-hxlab.wetolink.com/share/igdVbDCk2IkDhttps://note-hxlab.wetolink.com/share/igdVbDCk2IkDhttps://note-hxlab.wetolink.com/share/igdVbDCk2IkDhttps://note-hxlab.wetolink.com/share/igdVbDCk2IkD
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://note-hxlab.wetolink.com/share/igdVbDCk2IkD#proof-of-concept-https://note-hxlab.wetolink.com/share/igdVbDCk2IkD#proof-of-concept-https://note-hxlab.wetolink.com/share/igdVbDCk2IkD#proof-of-concept-https://note-hxlab.wetolink.com/share/igdVbDCk2IkD#proof-of-concept-https://note-hxlab.wetolink.com/share/igdVbDCk2IkD#proof-of-concept-
source_cveCVE-2025-11941CVE-2025-11941CVE-2025-11941CVE-2025-11941CVE-2025-11941
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
software_typeContent Management SystemContent Management SystemContent Management SystemContent Management SystemContent Management System
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore5.55.55.55.55.5
cvss2_vuldb_tempscore4.74.74.74.74.7
cvss3_vuldb_basescore5.45.45.45.45.4
cvss3_vuldb_tempscore4.94.94.94.94.9
cvss3_meta_basescore5.45.45.45.46.3
cvss3_meta_tempscore4.95.15.15.16.1
cvss4_vuldb_bscore5.35.35.35.35.3
cvss4_vuldb_btscore2.12.12.12.12.1
advisory_date1760738400 (18/10/2025)1760738400 (18/10/2025)1760738400 (18/10/2025)1760738400 (18/10/2025)1760738400 (18/10/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was detected in e107 CMS up to 2.3.3. This impacts an unknown function of the file /e107_admin/image.php?mode=main&action=avatar of the component Avatar Handler. Performing manipulation of the argument multiaction[] results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was detected in e107 CMS up to 2.3.3. This impacts an unknown function of the file /e107_admin/image.php?mode=main&action=avatar of the component Avatar Handler. Performing manipulation of the argument multiaction[] results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was detected in e107 CMS up to 2.3.3. This impacts an unknown function of the file /e107_admin/image.php?mode=main&action=avatar of the component Avatar Handler. Performing manipulation of the argument multiaction[] results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was detected in e107 CMS up to 2.3.3. This impacts an unknown function of the file /e107_admin/image.php?mode=main&action=avatar of the component Avatar Handler. Performing manipulation of the argument multiaction[] results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avNNNN
cvss4_cna_acLLLL
cvss4_cna_atNNNN
cvss4_cna_prLLLL
cvss4_cna_uiNNNN
cvss4_cna_vcNNNN
cvss4_cna_viLLLL
cvss4_cna_vaLLLL
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore5.35.35.35.3
cvss3_cna_avNNNN
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cNNNN
cvss3_cna_iLLLL
cvss3_cna_aLLLL
cvss3_cna_basescore5.45.45.45.4
cvss2_cna_avNNNN
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciNNNN
cvss2_cna_iiPPPP
cvss2_cna_aiPPPP
cvss2_cna_basescore5.55.55.55.5
euvd_idEUVD-2025-35005EUVD-2025-35005EUVD-2025-35005
cnnvd_idCNNVD-202510-2551CNNVD-202510-2551
cnnvd_namee107 路径遍历漏洞e107 路径遍历漏洞
cnnvd_hazardlevel33
cnnvd_create2025-10-202025-10-20
cnnvd_publish2025-10-192025-10-19
cnnvd_update2025-10-202025-10-20
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore8.1

Do you know our Splunk app?

Download it now for free!