A Path Traversal vulnerability has been identified in the Email Security appliance allows an attacker to manipulate file system paths by injecting crafted directory-traversal sequences (such as ../) and may access files and directories outside the intended restricted path.
References
| Link | Resource |
|---|---|
| https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0018 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-20 15:17
Updated : 2025-12-12 15:43
NVD link : CVE-2025-40605
Mitre link : CVE-2025-40605
CVE.ORG link : CVE-2025-40605
JSON object : View
Products Affected
sonicwall
- email_security_appliance_7050
- email_security_appliance_5000_firmware
- email_security_appliance_9000_firmware
- email_security_appliance_7000_firmware
- email_security_appliance_9000
- email_security_appliance_7000
- email_security_appliance_5000
- email_security_appliance_5050_firmware
- email_security_appliance_5050
- email_security_appliance_7050_firmware
CWE
CWE-23
Relative Path Traversal
