CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Lifecycle Timeline
4Tags
Description
Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated attacker could access unintended file directories. Fixed in 8.1.0 alpha.
Analysis
Census CSWeb 8.0.1 contains a path traversal vulnerability (CWE-22) allowing authenticated remote attackers to access arbitrary files outside intended directories through unvalidated file path input. A public proof-of-concept exploit is available on GitHub (hx381/cspro-exploits), significantly increasing exploitation risk. With a CVSS score of 8.8 and low attack complexity requiring only low-level privileges, this poses a critical threat to organizations running the affected version.
Technical Context
Census CSWeb is a web-based data management platform for statistical surveys and census operations, as identified by CPE cpe:2.3:a:census:csweb:*:*:*:*:*:*:*:*. The vulnerability stems from CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), commonly known as path traversal or directory traversal. The application fails to properly sanitize user-supplied file path inputs, allowing attackers to use special character sequences like '../' to navigate outside the intended directory structure and access sensitive files on the underlying operating system. This class of vulnerability typically affects file handling functions that construct file paths using untrusted input without adequate validation or canonicalization.
Affected Products
Census CSWeb version 8.0.1 and potentially earlier versions are confirmed vulnerable, as identified through CPE cpe:2.3:a:census:csweb:*:*:*:*:*:*:*:*. The fix was implemented in version 8.1.0 alpha according to the commit referenced at github.com/csprousers/csweb/commit/eba0b59a243390a1a4f9524cce6dbc0314bf0d91. Organizations running any CSWeb version prior to 8.1.0 alpha should assume they are vulnerable to arbitrary file path traversal attacks. CISA has documented this vulnerability in their CSAF advisory available at raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2026/va-26-079-01.json, indicating federal concern about the issue.
Remediation
Immediately upgrade Census CSWeb to version 8.1.0 alpha or later, which contains the security fix as documented in the GitHub commit at github.com/csprousers/csweb/commit/eba0b59a243390a1a4f9524cce6dbc0314bf0d91. Organizations unable to immediately patch should implement compensating controls including restricting network access to the CSWeb application to trusted IP ranges only, enforcing strong authentication mechanisms, enabling comprehensive file access logging to detect exploitation attempts, and applying principle of least privilege to the web application's file system permissions to limit the scope of accessible files. Review authentication logs and file access patterns for any suspicious activity indicating attempted or successful path traversal exploitation, particularly looking for unusual file access requests or attempts to read sensitive system files.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-208948
GHSA-q4rc-c232-4f3v