Vulnerabilities (CVE)

Filtered by CWE-22
Total 8088 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-45890 1 Xxyopen 1 Novel-plus 2025-06-26 N/A 9.8 CRITICAL
Directory Traversal vulnerability in novel plus before v.5.1.0 allows a remote attacker to execute arbitrary code via the filePath parameter
CVE-2018-14672 1 Clickhouse 1 Clickhouse 2025-06-25 5.0 MEDIUM 5.3 MEDIUM
In ClickHouse before 18.12.13, functions for loading CatBoost models allowed path traversal and reading arbitrary files through error messages.
CVE-2025-47511 1 Welcart 1 Welcart E-commerce 2025-06-25 N/A 6.8 MEDIUM
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in nanbu Welcart e-Commerce allows Path Traversal. This issue affects Welcart e-Commerce: from n/a through 2.11.13.
CVE-2025-3686 1 Misstt123 1 Oasys 2025-06-25 4.0 MEDIUM 4.3 MEDIUM
A vulnerability classified as problematic was found in misstt123 oasys 1.0. Affected by this vulnerability is the function image of the file /show. The manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
CVE-2025-48957 1 Astrbot 1 Astrbot 2025-06-25 N/A 7.5 HIGH
AstrBot is a large language model chatbot and development framework. A path traversal vulnerability present in versions 3.4.4 through 3.5.12 may lead to information disclosure, such as API keys for LLM providers, account passwords, and other sensitive data. The vulnerability has been addressed in Pull Request #1676 and is included in version 3.5.13. As a workaround, users can edit the `cmd_config.json` file to disable the dashboard feature as a temporary workaround. However, it is strongly recommended to upgrade to version v3.5.13 or later to fully resolve this issue.
CVE-2025-50348 1 Phpgurukul 1 Pre-school Enrollment System 2025-06-25 N/A 7.5 HIGH
PHPGurukul Pre-School Enrollment System Project V1.0 is vulnerable to Directory Traversal in update-class-pic.php.
CVE-2025-50349 1 Phpgurukul 1 Pre-school Enrollment System 2025-06-25 N/A 7.5 HIGH
PHPGurukul Pre-School Enrollment System Project V1.0 is vulnerable to Directory Traversal in update-teacher-pic.php.
CVE-2025-48273 1 Wpjobportal 1 Wp Job Portal 2025-06-24 N/A 7.5 HIGH
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in wpjobportal WP Job Portal allows Path Traversal. This issue affects WP Job Portal: from n/a through 2.3.2.
CVE-2024-48766 1 Netalertx 1 Netalertx 2025-06-24 N/A 8.6 HIGH
NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php.
CVE-2025-48026 2025-06-24 N/A 7.5 HIGH
A vulnerability in the WebApl component of Mitel OpenScape Xpressions through V7R1 FR5 HF43 P913 could allow an unauthenticated attacker to conduct a path traversal attack due to insufficient input validation. A successful exploit could allow an attacker to read files from the underlying OS and obtain sensitive information.
CVE-2024-46327 1 Vonets 2 Vap11g-300, Vap11g-300 Firmware 2025-06-24 N/A 5.7 MEDIUM
An issue in the Http_handle object of VONETS VAP11G-300 v3.3.23.6.9 allows attackers to access sensitive files via a directory traversal.
CVE-2025-4661 2025-06-23 N/A N/A
A path transversal vulnerability in Brocade Fabric OS 9.1.0 through 9.2.2 could allow a local admin user to gain access to files outside the intended directory potentially leading to the disclosure of sensitive information. Note: Admin level privilege is required on the switch in order to exploit
CVE-2025-3577 1 Zyxel 2 Amg1302-t10b, Amg1302-t10b Firmware 2025-06-23 N/A 4.9 MEDIUM
**UNSUPPORTED WHEN ASSIGNED** A path traversal vulnerability in the web management interface of the Zyxel AMG1302-T10B firmware version 2.00(AAJC.16)C0 could allow an authenticated attacker with administrator privileges to access restricted directories by sending a crafted HTTP request to an affected device.
CVE-2024-35324 1 Douchat 1 Douchat 2025-06-23 N/A 9.8 CRITICAL
Douchat 4.0.5 suffers from an arbitrary file upload vulnerability via Public/Plugins/webuploader/server/preview.php.
CVE-2024-5154 2 Kubernetes, Redhat 3 Cri-o, Enterprise Linux, Openshift Container Platform 2025-06-23 N/A 8.1 HIGH
A flaw was found in cri-o. A malicious container can create a symbolic link to arbitrary files on the host via directory traversal (“../“). This flaw allows the container to read and write to arbitrary files on the host system.
CVE-2025-46096 1 Noear 1 Solon 2025-06-23 N/A 6.1 MEDIUM
Directory Traversal vulnerability in solon v.3.1.2 allows a remote attacker to conduct XSS attacks via the solon-faas-luffy component
CVE-2025-29660 1 Yiiot 2 Xy-3820, Xy-3820 Firmware 2025-06-23 N/A 9.8 CRITICAL
A vulnerability exists in the daemon process of the Yi IOT XY-3820 v6.0.24.10, which exposes a TCP service on port 6789. This service lacks proper input validation, allowing attackers to execute arbitrary scripts present on the device by sending specially crafted TCP requests using directory traversal techniques.
CVE-2024-23904 1 Jenkins 1 Log Command 2025-06-20 N/A 7.5 HIGH
Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.
CVE-2024-22523 1 Fuwushe 1 Ifair 2025-06-20 N/A 7.5 HIGH
Directory Traversal vulnerability in Qiyu iFair version 23.8_ad0 and before, allows remote attackers to obtain sensitive information via uploadimage component.
CVE-2023-52288 1 Sujeetkv 1 Flaskcode 2025-06-20 N/A 7.5 HIGH
An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a GET request to a /resource-data/<file_path>.txt URI (from views.py), allows attackers to read arbitrary files.