Directory traversal vulnerability in MoinMoin 1.5.8 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the MOIN_ID user ID in a cookie for a userform action. NOTE: this issue can be leveraged for PHP code execution via the quicklinks parameter.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1514-1 | New moin packages fix several vulnerabilities |
![]() |
GHSA-6766-r2rx-mfw9 | MoinMoin Directory traversal vulnerability |
![]() |
USN-716-1 | MoinMoin vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 28 May 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
Thu, 22 May 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T07:54:23.406Z
Reserved: 2008-02-14T00:00:00
Link: CVE-2008-0782

No data.

Status : Deferred
Published: 2008-02-14T21:00:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-0782


No data.