A path traversal vulnerability exists in TMS Management Console (version 6.3.7.27386.20250818) from TMS Global Software. The "Download Template" function in the profile dashboard does not neutralize directory traversal sequences (../) in the filePath parameter, allowing authenticated users to read arbitrary files, such as the server's Web.config.
References
| Link | Resource |
|---|---|
| http://tms.com | Not Applicable |
| https://github.com/Cr0wld3r/CVE-2025-69612/blob/main/PoC.md | Third Party Advisory Exploit |
| https://tmsglobalsoft.com/ | Product |
Configurations
History
No history.
Information
Published : 2026-01-22 16:16
Updated : 2026-02-03 14:06
NVD link : CVE-2025-69612
Mitre link : CVE-2025-69612
CVE.ORG link : CVE-2025-69612
JSON object : View
Products Affected
tmsglobalsoft
- tms_management_console
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
