Path Traversal

web HIGH

Path traversal exploits occur when applications use user-controlled input to construct file system paths without proper validation.

How It Works

Path traversal exploits occur when applications use user-controlled input to construct file system paths without proper validation. Attackers inject special sequences like ../ (dot-dot-slash) to escape the intended directory and navigate to arbitrary locations in the file system. Each ../ sequence moves up one directory level, allowing an attacker to break out of a restricted folder and access sensitive files elsewhere on the server.

Attackers employ various encoding techniques to bypass basic filters. Simple URL encoding transforms ../ into %2e%2e%2f, while double encoding becomes %252e%252e%252f (encoding the percent sign itself). Other evasion methods include nested sequences like ....// (which become ../ after filter removal), null byte injection (%00 to truncate path validation), and OS-specific path separators (backslashes on Windows). Absolute paths like /etc/passwd may also work if the application doesn't enforce relative path constraints.

The typical attack flow begins with identifying input parameters that reference files—such as file=, path=, template=, or page=. The attacker then tests various traversal payloads to determine if path validation exists and what depth is needed to reach system files. Success means reading configuration files, credentials, source code, or even writing malicious files if the application allows file uploads or modifications.

Impact

  • Credential exposure: Access to configuration files containing database passwords, API keys, and authentication tokens
  • Source code disclosure: Reading application code reveals business logic, additional vulnerabilities, and hardcoded secrets
  • System file access: Retrieving /etc/passwd, /etc/shadow, or Windows SAM files for credential cracking
  • Configuration tampering: If write access exists, attackers modify settings or inject malicious code
  • Remote code execution: Writing web shells or executable files to web-accessible directories enables full system compromise

Real-World Examples

ZendTo file sharing application (CVE-2025-34508) contained a path traversal vulnerability allowing unauthenticated attackers to read arbitrary files from the server. The flaw existed in file retrieval functionality where user input directly influenced file path construction without adequate validation, exposing sensitive configuration data and potentially system files.

Web application frameworks frequently suffer from path traversal in template rendering engines. When applications allow users to specify template names or include files, insufficient validation permits attackers to read source code from other application modules or framework configuration files, revealing database credentials and session secrets.

File download features in content management systems represent another common vector. Applications that serve user-requested files from disk often fail to restrict paths properly, enabling attackers to download backup files, logs containing sensitive data, or administrative scripts that weren't intended for public access.

Mitigation

  • Avoid user input in file paths: Use indirect references like database IDs mapped to filenames on the server side
  • Canonicalize and validate: Convert paths to absolute canonical form, then verify they remain within the allowed base directory
  • Allowlist permitted files: Maintain an explicit list of accessible files rather than trying to blocklist malicious patterns
  • Chroot jails or sandboxing: Restrict application file system access to specific directories at the OS level
  • Strip dangerous sequences: Remove ../, ..\\, and encoded variants, though this alone is insufficient

Recent CVEs (1798)

CVE-2025-37168
EPSS 0% CVSS 8.2
HIGH This Week

Arbitrary file deletion vulnerability have been identified in a system function of mobility conductors running AOS-8 operating system. [CVSS 8.2 HIGH]

Path Traversal Information Disclosure Arubaos
NVD
CVE-2026-20834
EPSS 0% CVSS 4.6
MEDIUM This Month

Windows Shell path traversal vulnerability affecting Windows 10 21H2, Windows Server 2016, 2019, and 2022 allows an attacker with physical access to spoof system resources without requiring user interaction. The vulnerability has no patch available and poses a confidentiality risk through unauthorized information disclosure.

Windows Path Traversal Windows Server 2016 +14
NVD
CVE-2025-58693
EPSS 0% CVSS 6.5
MEDIUM This Month

An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiVoice 7.2.0 through 7.2.2, FortiVoice 7.0.0 through 7.0.7 allows a privileged attacker to delete files from the underlying filesystem via crafted HTTP or HTTPs requests. [CVSS 6.5 MEDIUM]

Fortinet Path Traversal Fortivoice
NVD
CVE-2025-25652
EPSS 1% CVSS 7.5
HIGH POC This Week

In Eptura Archibus 2024.03.01.109, the "Run script" and "Server File" components of the "Database Update Wizard" are vulnerable to directory traversal. [CVSS 7.5 HIGH]

Path Traversal Archibus
NVD
CVE-2026-0408
EPSS 0% CVSS 8.0
HIGH PATCH This Week

NETGEAR WiFi extenders (Ex5000, Ex6110, Ex2800, Ex3110) with improper path traversal validation allow authenticated LAN users to access the webproc configuration file and extract stored router credentials. An attacker with local network access can leverage this to obtain administrative credentials for further network compromise. A patch is available.

Netgear Path Traversal Ex5000 Firmware +3
NVD
CVE-2025-9435
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Zohocorp ManageEngine ADManager Plus versions below 7230 are vulnerable to Path Traversal in the User Management module [CVSS 5.5 MEDIUM]

Path Traversal Manageengine Admanager Plus
NVD
CVE-2026-22786
EPSS 0% CVSS 7.2
HIGH POC PATCH This Week

Gin-vue-admin versions 2.8.7 and earlier contain a path traversal vulnerability in the breakpoint resume upload API that allows authenticated attackers to write arbitrary files to any directory on the system. Public exploit code exists for this vulnerability, which affects administrators and users with file upload privileges. An attacker can bypass directory restrictions by injecting traversal sequences (../) into the fileName parameter to escape the intended fileDir location.

Golang Path Traversal Gin Vue Admin +1
NVD GitHub
CVE-2025-68472
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.11.1, an unauthenticated path traversal in the file upload API lets any caller read arbitrary files from the server filesystem and move them into MindsDB’s storage, exposing sensitive data. [CVSS 8.1 HIGH]

Path Traversal AI / ML Mindsdb
NVD GitHub
CVE-2025-66689
EPSS 0% CVSS 6.5
MEDIUM POC This Month

A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. [CVSS 6.5 MEDIUM]

Path Traversal Pal Mcp Server
NVD GitHub
CVE-2025-69267
EPSS 0% CVSS 6.5
MEDIUM This Month

Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Path Traversal.This issue affects DX NetOps Spectrum: 24.3.8 and earlier. [CVSS 6.5 MEDIUM]

Broadcom Linux Windows +2
NVD
CVE-2026-22685
EPSS 0% CVSS 8.8
HIGH PATCH This Week

DevToys versions 2.0.0.0 through 2.0.8.x are vulnerable to path traversal attacks during extension package installation, allowing attackers to write files outside the intended directory by crafting malicious NUPKG archives with directory traversal sequences. An attacker can exploit this to overwrite arbitrary files with DevToys process privileges, potentially enabling code execution or system compromise on affected systems. The vulnerability is patched in version 2.0.9.0.

Path Traversal Devtoys
NVD GitHub
CVE-2025-66744
EPSS 7% CVSS 7.5
HIGH This Week

In Yonyou YonBIP v3 and before, the LoginWithV8 interface in the series data application service system is vulnerable to path traversal, allowing unauthorized access to sensitive information within the system [CVSS 7.5 HIGH]

Path Traversal
NVD GitHub
CVE-2025-66051
EPSS 0% CVSS 6.5
MEDIUM This Month

Vivotek IP7137 camera with firmware version 0200a is vulnerable to path traversal. It is possible for an authenticated attacker to access resources beyond webroot directory using a direct HTTP request. [CVSS 6.5 MEDIUM]

Path Traversal Ip7137 Firmware
NVD
CVE-2025-69194
EPSS 0% CVSS 8.8
HIGH PATCH This Week

A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. [CVSS 8.8 HIGH]

Path Traversal Wget2 Redhat +1
NVD
CVE-2025-67914
EPSS 0% CVSS 7.5
HIGH This Week

Path Traversal: '.../...//' vulnerability in beeteam368 VidMov vidmov allows Path Traversal.This issue affects VidMov: from n/a through <= 2.3.8. [CVSS 7.5 HIGH]

Path Traversal
NVD
CVE-2019-25295
EPSS 0% CVSS 6.5
MEDIUM This Month

The WP Cost Estimation plugin for WordPress is vulnerable to Upload Directory Traversal in versions before 9.660 via the uploadFormFiles function. This allows attackers to overwrite any file with a whitelisted type on an affected site. [CVSS 6.5 MEDIUM]

WordPress Path Traversal
NVD
CVE-2026-21858
EPSS 7% CVSS 10.0
CRITICAL POC PATCH Act Now

n8n workflow automation (1.65.0 to 1.121.0) allows unauthenticated file access through form-based workflows. A critical CVSS 10.0 vulnerability enabling remote attackers to read sensitive files from the server, with potential for further compromise. PoC available.

Information Disclosure Path Traversal Lfi +2
NVD GitHub
CVE-2026-21857
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Arbitrary file disclosure in REDAXO's Backup addon allows authenticated users with backup permissions to read any file within the webroot by bypassing directory validation in the file export function. An attacker can manipulate the EXPDIR parameter with path traversal sequences to include unauthorized files in exported archives. Public exploit code exists; a patch is available in version 5.20.2 and later.

PHP Path Traversal Redaxo
NVD GitHub
CVE-2026-21851
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

MONAI versions up to 1.5.1 contain a path traversal vulnerability in the `_download_from_ngc_private()` function that fails to validate extracted archive contents, allowing attackers to write files outside the intended directory during package extraction. An attacker with user interaction can exploit this via a malicious ZIP file to overwrite arbitrary files on the system. Public exploit code exists for this vulnerability, and a patch is available in commit 4014c8475626f20f158921ae0cf98ed259ae4d59.

Path Traversal AI / ML Monai
NVD GitHub
CVE-2025-68705
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

RustFS (alpha.13 to alpha.78) has a path traversal in /rustfs/rpc/read_file_stream that allows reading arbitrary files on the server. PoC available, fixed in alpha.79.

Path Traversal Rustfs
NVD GitHub
CVE-2026-0669
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

The MediaWiki CSS extension in versions 1.39, 1.43, and 1.44 contains a path traversal vulnerability that allows unauthenticated remote attackers to read arbitrary files from the server. Public exploit code exists for this vulnerability, enabling attackers to access sensitive information outside the intended directory restrictions. A patch is available and should be applied immediately to affected installations.

Mediawiki Path Traversal Css +1
NVD
CVE-2025-67366
EPSS 0% CVSS 7.5
HIGH POC This Week

Filesystem-Mcp versions up to 0.5.8 contains a vulnerability that allows attackers to bypass directory restrictions by leveraging symlinks within the allowed director (CVSS 7.5).

Path Traversal AI / ML Filesystem Mcp
NVD GitHub
CVE-2025-67364
EPSS 0% CVSS 7.5
HIGH POC This Week

fast-filesystem-mcp version 3.4.0 contains a critical path traversal vulnerability in its file operation tools including fast_read_file. This vulnerability arises from improper path validation that fails to resolve symbolic links to their actual physical paths. [CVSS 7.5 HIGH]

Path Traversal AI / ML Fast Filesystem Mcp
NVD GitHub
CVE-2025-46256
EPSS 0% CVSS 6.4
MEDIUM This Month

Path Traversal: '.../...//' vulnerability in SigmaPlugin Advanced Database Cleaner PRO allows Path Traversal.This issue affects Advanced Database Cleaner PRO: from n/a through 3.2.10. [CVSS 6.4 MEDIUM]

Path Traversal
NVD
CVE-2025-14867
EPSS 0% CVSS 6.5
MEDIUM This Month

The Flashcard plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 0.9 via the 'source' attribute of the 'flashcard' shortcode. [CVSS 6.5 MEDIUM]

WordPress Path Traversal PHP
NVD
CVE-2025-14059
EPSS 0% CVSS 6.5
MEDIUM This Month

The EmailKit plugin for WordPress is vulnerable to Arbitrary File Read via Path Traversal in all versions up to, and including, 1.6.1. [CVSS 6.5 MEDIUM]

WordPress PHP Path Traversal
NVD
CVE-2025-13801
EPSS 0% CVSS 7.5
HIGH This Week

The Yoco Payments plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 3.8.8 via the file parameter. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. [CVSS 7.5 HIGH]

WordPress Path Traversal
NVD
CVE-2020-36909
EPSS 0% CVSS 6.5
MEDIUM POC This Month

SnapGear Management Console SG560 3.1.5 contains a file manipulation vulnerability that allows authenticated users to read, write, and delete files using the edit_config_files CGI script. [CVSS 6.5 MEDIUM]

Path Traversal Snapgear Sg560 Firmware
NVD Exploit-DB
CVE-2020-36905
EPSS 0% CVSS 7.5
HIGH POC This Week

undocumented proxy API is affected by inclusion of functionality from untrusted control sphere (CVSS 7.5).

Path Traversal RCE
NVD Exploit-DB
CVE-2025-14997
EPSS 1% CVSS 8.8
HIGH This Week

The BuddyPress Xprofile Custom Field Types plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete_field' function in all versions up to, and including, 1.2.8. [CVSS 7.2 HIGH]

WordPress PHP RCE +1
NVD
CVE-2026-0604
EPSS 0% CVSS 6.5
MEDIUM This Month

Path traversal in the FastDup WordPress plugin through version 2.7 allows authenticated contributors and above to enumerate and read arbitrary directories on affected servers via a malicious 'dir_path' parameter in the REST API. This vulnerability enables attackers with low-level WordPress access to access sensitive files and configuration data without requiring elevated privileges or user interaction.

WordPress Path Traversal
NVD
CVE-2025-69226
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below enable an attacker to ascertain the existence of absolute path components through the path normalization logic for static files meant to prevent path traversal. [CVSS 5.3 MEDIUM]

Python Path Traversal Aiohttp +2
NVD GitHub
CVE-2025-68953
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Frappe is a full-stack web application framework. Versions 14.99.5 and below and 15.0.0 through 15.80.1 include requests that are vulnerable to path traversal attacks. [CVSS 7.5 HIGH]

Path Traversal Frappe
NVD GitHub
CVE-2025-68428
EPSS 0% CVSS 7.5
HIGH PATCH This Week

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. [CVSS 7.5 HIGH]

Node.js Lfi Path Traversal +2
NVD GitHub
CVE-2025-15237
EPSS 0% CVSS 4.3
MEDIUM This Month

QOCA aim AI Medical Cloud Platform developed by Quanta Computer has a Path Traversal vulnerability, allowing authenticated remote attackers to read folder names under the specified path by exploiting an Absolute Path Traversal vulnerability. [CVSS 4.3 MEDIUM]

Path Traversal AI / ML Qoca Aim
NVD
CVE-2025-15236
EPSS 0% CVSS 4.3
MEDIUM This Month

QOCA aim AI Medical Cloud Platform developed by Quanta Computer has a Path Traversal vulnerability, allowing authenticated remote attackers to read folder names under the specified path by exploiting an Absolute Path Traversal vulnerability. [CVSS 4.3 MEDIUM]

Path Traversal AI / ML Qoca Aim
NVD
CVE-2025-15449
EPSS 0% CVSS 5.4
MEDIUM POC This Month

A vulnerability was determined in cld378632668 JavaMall up to 994f1e2b019378ec9444cdf3fce2d5b5f72d28f0. Affected is the function delete of the file src/main/java/com/macro/mall/controller/MinioController.java. [CVSS 5.4 MEDIUM]

Java Path Traversal Javamall
NVD GitHub VulDB
CVE-2026-0571
EPSS 0% CVSS 4.3
MEDIUM POC This Month

Path traversal in the yeqifu Warehouse application's file handling function allows authenticated attackers to read arbitrary files on the system through manipulated path parameters. Public exploit code exists for this vulnerability, increasing the risk of exploitation. The rolling-release nature of the product means affected users lack clear version guidance and no official patch is currently available.

Java Path Traversal Warehouse
NVD GitHub VulDB
CVE-2026-21440
EPSS 0%
PATCH Monitor

AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem.

Path Traversal
NVD GitHub
CVE-2025-67160
EPSS 0% CVSS 7.5
HIGH POC This Week

An issue in Vatilon v1.12.37-20240124 allows attackers to access sensitive directories and files via a directory traversal. [CVSS 7.5 HIGH]

Path Traversal Pa4 Firmware
NVD GitHub
CVE-2025-59384
EPSS 0% CVSS 7.5
HIGH This Week

A path traversal vulnerability has been reported to affect Qfiling. The remote attackers can then exploit the vulnerability to read the contents of unexpected files or system data. [CVSS 7.5 HIGH]

Path Traversal Qfiling
NVD
CVE-2025-59381
EPSS 0% CVSS 4.9
MEDIUM This Month

A path traversal vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data. [CVSS 4.9 MEDIUM]

Qnap Path Traversal Quts Hero +1
NVD
CVE-2025-59380
EPSS 0% CVSS 4.9
MEDIUM This Month

A path traversal vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data. [CVSS 4.9 MEDIUM]

Qnap Path Traversal Qts +1
NVD
CVE-2025-53594
EPSS 0%
Monitor

A path traversal vulnerability has been reported to affect several product versions. If a local attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.

Path Traversal
NVD
CVE-2025-15432
EPSS 0% CVSS 5.3
MEDIUM POC This Month

A vulnerability has been found in yeqifu carRental up to 3fabb7eae93d209426638863980301d6f99866b3. This vulnerability affects the function downloadShowFile of the file /file/downloadShowFile.action of the component com.yeqifu.sys.controller.FileController. [CVSS 5.3 MEDIUM]

Path Traversal Carrental
NVD GitHub VulDB
CVE-2025-62992
EPSS 0% CVSS 8.1
HIGH This Week

Cross-Site Request Forgery (CSRF) in Everest Backup WordPress plugin versions ≤2.3.11 enables unauthenticated attackers to manipulate backup file paths via path traversal, potentially exposing sensitive files or altering backup integrity. The vulnerability requires user interaction (CVSS UI:R) and carries no authentication requirement (PR:N), allowing remote exploitation through social engineering. EPSS probability of 0.01% (1st percentile) indicates minimal observed exploitation activity in the wild, and no public exploit identified at time of analysis. Despite CVSS 8.1 severity reflecting high confidentiality and integrity impact, real-world risk remains moderate given the user-interaction dependency and absence of active exploitation indicators.

WordPress PHP CSRF +2
NVD
CVE-2025-43518
EPSS 0% CVSS 3.3
LOW Monitor

Local privilege escalation in Apple's spellcheck API allows authenticated users to inappropriately access files on macOS, iOS, and related platforms through a logic flaw in access controls. Affected versions include macOS Sonoma 14.x and earlier, macOS Sequoia 15.7.2 and earlier, iOS 18.x and earlier, iPadOS 18.x and earlier, and watchOS 11.x and earlier. This vulnerability requires local access and user-level privileges but carries a low EPSS score (0.01%, percentile 3%) indicating minimal real-world exploitation likelihood at present. No public exploit code or active exploitation has been identified.

Apple iOS macOS +2
NVD
CVE-2025-43463
EPSS 0% CVSS 5.5
MEDIUM This Month

Path traversal vulnerability in macOS directory path handling allows local apps with user privileges to read sensitive user data through improper path validation. Affects macOS Sequoia (before 15.7.3), Sonoma (before 14.8.3), and Tahoe (before 26.1). EPSS score of 0.01% indicates minimal real-world exploitation likelihood despite moderate CVSS severity.

Apple macOS Path Traversal +1
NVD
CVE-2025-14344
EPSS 0% CVSS 9.8
CRITICAL Act Now

Arbitrary file deletion in Multi Uploader for Gravity Forms (WordPress plugin ≤1.1.7) allows unauthenticated remote attackers to delete any file on the server through insufficient path validation in the plupload_ajax_delete_file function. Exploitation requires no credentials or user interaction. CVSS 9.8 Critical severity reflects network-accessible attack with high impact to confidentiality, integrity, and availability. Low observed exploitation activity (EPSS 0.37%). No public exploit identified at time of analysis.

Path Traversal WordPress
NVD
CVE-2025-13972
EPSS 0% CVSS 4.9
MEDIUM This Month

Arbitrary file read in WatchTowerHQ WordPress plugin versions up to 3.16.0 allows authenticated administrators with valid access tokens to read sensitive server files via path traversal in the 'wht_download_big_object_origin' parameter. The vulnerability exploits insufficient path validation in the handle_big_object_download_request function, potentially exposing database credentials and authentication keys. No public exploit code or active exploitation has been confirmed at time of analysis.

Path Traversal WordPress
NVD
CVE-2025-14293
EPSS 0% CVSS 6.5
MEDIUM This Month

WP Job Portal plugin for WordPress allows authenticated attackers with Subscriber-level access to read arbitrary files on the server through path traversal in the 'downloadCustomUploadedFile' function, potentially exposing sensitive configuration files, database credentials, or other confidential data. The vulnerability affects all versions up to and including 2.4.0, with CVSS 6.5 reflecting the high confidentiality impact but low attack complexity and requirement only for basic authenticated access.

Path Traversal WordPress
NVD
CVE-2025-65799
EPSS 0% CVSS 4.3
MEDIUM POC PATCH This Month

A lack of file name validation or verification in the Attachment service of usememos memos v0.25.2 allows attackers to execute a path traversal.

Path Traversal Memos Suse
NVD GitHub
CVE-2025-61318
EPSS 1% CVSS 9.1
CRITICAL POC Act Now

Emlog Pro 2.5.20 has an arbitrary file deletion vulnerability. This vulnerability stems from the admin/template.php component and the admin/plugin.php component. They fail to perform path verification and dangerous code filtering for deletion parameters, allowing attackers to exploit this feature for directory traversal.

PHP Path Traversal Emlog
NVD GitHub
CVE-2025-14224
EPSS 0% CVSS 4.3
MEDIUM POC This Month

A vulnerability was found in Yottamaster DM2, DM3 and DM200 up to 1.2.23/1.9.12. Affected by this issue is some unknown functionality of the component File Upload. Performing manipulation results in path traversal. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

File Upload Path Traversal Dm3 Firmware +2
NVD VulDB
CVE-2025-14253
EPSS 0% CVSS 4.9
MEDIUM This Month

Vitals ESP developed by Galaxy Software Services has an Arbitrary File Read vulnerability, allowing privileged remote attackers to exploit Absolute Path Traversal to download arbitrary system files.

Path Traversal Vitalsesp
NVD
CVE-2025-14220
EPSS 0% CVSS 4.3
MEDIUM This Month

A security vulnerability has been detected in ORICO CD3510 1.9.12. This affects an unknown function of the component File Upload. The manipulation leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

File Upload Path Traversal
NVD VulDB
CVE-2025-14182
EPSS 0% CVSS 6.3
MEDIUM This Month

A vulnerability has been found in Sobey Media Convergence System 2.0/2.1. This vulnerability affects unknown code of the file /sobey-mchEditor/watermark/upload. The manipulation of the argument File leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Path Traversal Media Convergence System
NVD GitHub VulDB
CVE-2025-13377
EPSS 0% CVSS 9.6
CRITICAL PATCH Act Now

The 10Web Booster - Website speed optimization, Cache & Page Speed optimizer plugin for WordPress is vulnerable to arbitrary folder deletion due to insufficient file path validation in the get_cache_dir_for_page_from_url() function in all versions up to, and including, 2.32.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary folders on the server, which can easily lead to a loss of data or a denial of service condition.

Path Traversal WordPress Denial Of Service +2
NVD
CVE-2025-14111
EPSS 0% CVSS 5.0
MEDIUM POC This Month

A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.20 build 128 is able to mitigate this issue. You should upgrade the affected component. The vendor responded very professional: "This is the real vulnerability affecting RAR for Android only. WinRAR and Unix RAR versions are not affected. We already fixed it in RAR for Android 7.20 build 128 and we publicly mentioned it in that version changelog. (...) To avoid confusion among users, it would be useful if such disclosure emphasizes that it is RAR for Android only issue and WinRAR isn't affected."

Path Traversal Google Rar +1
NVD GitHub VulDB
CVE-2025-65879
EPSS 1% CVSS 8.1
HIGH POC This Week

Warehouse Management System 1.2 contains an authenticated arbitrary file deletion vulnerability. The /goods/deleteGoods endpoint accepts a user-controlled goodsimg parameter, which is directly concatenated with the server's UPLOAD_PATH and passed to File.delete() without validation. A remote authenticated attacker can delete arbitrary files on the server by supplying directory traversal payloads.

Path Traversal Warehouse Management System
NVD GitHub
CVE-2025-65878
EPSS 1% CVSS 7.5
HIGH POC This Week

The warehouse management system version 1.2 contains an arbitrary file read vulnerability. The endpoint `/file/showImageByPath` does not sanitize user-controlled path parameters. An attacker could exploit directory traversal to read arbitrary files on the server's file system. This could lead to the leakage of sensitive system information.

Path Traversal Warehouse Management System
NVD GitHub
CVE-2025-65897
EPSS 0% CVSS 8.8
HIGH PATCH This Week

zdh_web is a data collection, processing, monitoring, scheduling, and management platform. In zdh_web thru 5.6.17, insufficient validation of file upload paths in the application allows an authenticated user to write arbitrary files to the server file system, potentially overwriting existing files and leading to privilege escalation or remote code execution.

Privilege Escalation Path Traversal File Upload +2
NVD GitHub
CVE-2025-64057
EPSS 0% CVSS 8.3
HIGH POC This Week

Directory traversal vulnerability in Fanvil x210 V2 2.12.20 allows unauthenticated attackers on the local network to store files in arbitrary locations and potentially modify the system configuration or other unspecified impacts.

Path Traversal X210 Firmware
NVD GitHub
CVE-2025-12097
EPSS 0% CVSS 7.5
HIGH This Week

There is a relative path traversal vulnerability in the NI System Web Server that may result in information disclosure.  Successful exploitation requires an attacker to send a specially crafted request to the NI System Web Server, allowing the attacker to read arbitrary files.  This vulnerability existed in the NI System Web Server 2012 and prior versions.  It was fixed in 2013.

Path Traversal Information Disclosure
NVD
CVE-2025-56427
EPSS 1% CVSS 7.5
HIGH POC This Week

Directory Traversal vulnerability in ComposioHQ v.0.7.20 allows a remote attacker to obtain sensitive information via the _download_file_or_dir function.

Path Traversal Information Disclosure Composio
NVD GitHub
CVE-2025-54160
EPSS 0% CVSS 7.8
HIGH This Week

Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows local users to execute arbitrary code via unspecified vectors.

Synology Path Traversal RCE +1
NVD
CVE-2025-65346
EPSS 0% CVSS 9.1
CRITICAL POC Act Now

alexusmai laravel-file-manager 3.3.1 and below is vulnerable to Directory Traversal. The unzip/extraction functionality improperly allows archive contents to be written to arbitrary locations on the filesystem due to insufficient validation of extraction paths.

Path Traversal Laravel File Manager
NVD GitHub
CVE-2025-54307
EPSS 0% CVSS 8.8
HIGH This Week

An issue was discovered in the Thermo Fisher Torrent Suite Django application 5.18.1. The /configure/plugins/plugin/upload/zip/ and /configure/newupdates/offline/bundle/upload/ endpoints allow low-privilege users to upload ZIP files to the server. The plupload_file_upload function handles these file uploads and constructs the destination file path by using either the name parameter or the uploaded filename, neither of which is properly sanitized. The file extension is extracted by splitting the filename, and a format string is used to construct the final file path, leaving the destination path vulnerable to path traversal. An authenticated attacker with network connectivity can write arbitrary files to the server, enabling remote code execution after overwriting an executable file. An example is the pdflatex executable, which is executed through subprocess.Popen in the write_report_pdf function after requests to a /report/latex/(\d+).pdf endpoint.

Path Traversal RCE Python +1
NVD
CVE-2025-29846
EPSS 0% CVSS 7.2
HIGH This Week

A vulnerability in portenable cgi allows remote authenticated users to get the status of installed packages.

Path Traversal Router Manager
NVD
CVE-2025-29845
EPSS 0% CVSS 4.3
MEDIUM This Month

A vulnerability in VideoPlayer2 subtitle cgi allows remote authenticated users to read .srt files.

Path Traversal Router Manager
NVD
CVE-2025-29844
EPSS 0% CVSS 4.3
MEDIUM This Month

A vulnerability in FileStation file cgi allows remote authenticated users to read file metadata and path information.

Path Traversal Router Manager
NVD
CVE-2025-29843
EPSS 0% CVSS 5.4
MEDIUM This Month

A vulnerability in FileStation thumb cgi allows remote authenticated users to read/write image files.

Path Traversal Router Manager
NVD
CVE-2025-65345
EPSS 0% CVSS 6.5
MEDIUM This Month

alexusmai laravel-file-manager 3.3.1 and below is vulnerable to Directory Traversal. The zip/archiving functionality allows an attacker to create archives containing files and directories outside the intended scope due to improper path validation.

Path Traversal Laravel File Manager
NVD GitHub
CVE-2025-13645
EPSS 1% CVSS 7.2
HIGH PATCH This Week

The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_unzip_file' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

Path Traversal WordPress PHP +2
NVD GitHub
CVE-2025-13876
EPSS 0% CVSS 5.3
MEDIUM POC This Month

A security vulnerability has been detected in Rareprob HD Video Player All Formats App 12.1.372 on Android. Impacted is an unknown function of the component com.rocks.music.videoplayer. The manipulation leads to path traversal. The attack needs to be performed locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Google Path Traversal Hd Video Player All Formats +1
NVD GitHub VulDB
CVE-2025-13875
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A weakness has been identified in Yohann0617 oci-helper up to 3.2.4. This issue affects the function addCfg of the file src/main/java/com/yohann/ocihelper/service/impl/OciServiceImpl.java of the component OCI Configuration Upload. Executing manipulation of the argument File can lead to path traversal. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Java Path Traversal
NVD GitHub VulDB
CVE-2025-13879
EPSS 0% CVSS 2.7
LOW Monitor

Directory traversal vulnerability in SOLIDserver IPAM v8.2.3. This vulnerability allows an authenticated user with administrator privileges to list directories other than those to which the have authorized access using the 'directory' parameter in '/mod/ajax.php?action=sections/list/list'.For examplem setting the 'directory' parameter to '/' displays files outside the 'LOCAL:///' folder.

PHP Path Traversal
NVD
CVE-2025-66410
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Path Traversal Gin Vue Admin Suse
NVD GitHub
CVE-2025-66302
EPSS 0% CVSS 6.8
MEDIUM POC PATCH This Month

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A path traversal vulnerability has been identified in Grav CMS, allowing authenticated attackers with administrative privileges to read arbitrary files on the underlying server filesystem. This vulnerability arises due to insufficient input sanitization in the backup tool, where user-supplied paths are not properly restricted, enabling access to files outside the intended webroot directory. The impact of this vulnerability depends on the privileges of the user account running the application. This vulnerability is fixed in 1.8.0-beta.27.

Path Traversal Grav
NVD GitHub
CVE-2025-66300
EPSS 0% CVSS 8.5
HIGH POC PATCH This Week

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A low privilege user account with page editing privilege can read any server files using "Frontmatter" form. This includes Grav user account files (/grav/user/accounts/*.yaml), which store hashed user password, 2FA secret, and the password reset token. This can allow an adversary to compromise any registered account by resetting a password for a user to get access to the password reset token from the file or by cracking the hashed password. This vulnerability is fixed in 1.8.0-beta.27.

Path Traversal Grav
NVD GitHub
CVE-2025-66295
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, when a user with privilege of user creation creates a new user through the Admin UI and supplies a username containing path traversal sequences (for example ..\Nijat or ../Nijat), Grav writes the account YAML file to an unintended path outside user/accounts/. The written YAML can contain account fields such as email, fullname, twofa_secret, and hashed_password. This vulnerability is fixed in 1.8.0-beta.27.

Path Traversal Grav
NVD GitHub
CVE-2025-66206
EPSS 0% CVSS 6.8
MEDIUM This Month

Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, certain requests were vulnerable to path traversal attacks, wherein some files from the server could be retrieved if the full path was known. Sites hosted on Frappe Cloud, and even other setups that are behind a reverse proxy like NGINX are unaffected. This would mainly affect someone directly using werkzeug/gunicorn. In those cases, either an upgrade or changing the setup to use a reverse proxy is recommended. This vulnerability is fixed in 15.86.0 and 14.99.2.

Nginx Path Traversal Frappe
NVD GitHub
CVE-2025-65838
EPSS 0% CVSS 7.5
HIGH POC This Week

PublicCMS V5.202506.b is vulnerable to path traversal via the doUploadSitefile method.

Path Traversal Publiccms
NVD GitHub
CVE-2025-63365
EPSS 0% CVSS 7.1
HIGH This Week

SoftSea EPUB File Reader 1.0.0.0 is vulnerable to Directory Traversal. The vulnerability resides in the EPUB file processing component, specifically in the functionality responsible for extracting and handling EPUB archive contents.

Path Traversal Epub File Reader
NVD
CVE-2025-13816
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A security vulnerability has been detected in moxi159753 Mogu Blog v2 up to 5.2. The impacted element is the function FileOperation.unzip of the file /networkDisk/unzipFile of the component ZIP File Handler. Such manipulation of the argument fileUrl leads to path traversal. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Path Traversal Mogublog
NVD GitHub VulDB
CVE-2025-13810
EPSS 0% CVSS 5.3
MEDIUM POC This Month

A vulnerability was found in jsnjfz WebStack-Guns 1.0. This affects the function renderPicture of the file src/main/java/com/jsnjfz/manage/modular/system/controller/KaptchaController.java. Performing a manipulation results in path traversal. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Java Path Traversal Webstack Guns
NVD GitHub VulDB
CVE-2025-13791
EPSS 0% CVSS 5.3
MEDIUM POC This Month

A vulnerability was identified in Scada-LTS up to 2.7.8.1. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Path Traversal Java Scada Lts
NVD GitHub VulDB
CVE-2025-12638
EPSS 0% CVSS 8.0
HIGH PATCH This Week

Keras version 3.11.3 is affected by a path traversal vulnerability in the keras.utils.get_file() function when extracting tar archives. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Path Traversal RCE Python +1
NVD
CVE-2025-13771
EPSS 0% CVSS 7.1
HIGH This Week

WebITR developed by Uniong has an Arbitrary File Read vulnerability, allowing authenticated remote attackers to exploit Relative Path Traversal to download arbitrary system files. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Path Traversal Webitr
NVD
CVE-2025-66386
EPSS 0% CVSS 4.1
MEDIUM This Month

app/Model/EventReport.php in MISP before 2.5.27 allows path traversal in view picture for a site-admin. Rated medium severity (CVSS 4.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Path Traversal PHP
NVD GitHub
Prev Page 8 of 20 Next

Quick Facts

Typical Severity
HIGH
Category
web
Total CVEs
1798

Related CWEs

MITRE ATT&CK

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy