Description
VideoFlow Digital Video Protection DVP 2.10 contains an authenticated directory traversal vulnerability that allows authenticated attackers to disclose arbitrary files by injecting path traversal sequences in the ID parameter. Attackers can submit requests to downloadsys.pl, download_xml.pl, download.pl, downloadmib.pl, or downloadFile.pl with directory traversal payloads to read sensitive system files like /etc/passwd.
Published: 2026-04-29
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

VideoFlow Digital Video Protection DVP 2.10 has an authenticated directory traversal flaw that lets authenticated users supply path traversal sequences in the ID parameter to download scripts such as downloadsys.pl, download_xml.pl, download.pl, downloadmib.pl, and downloadFile.pl. This enables the attacker to read arbitrary files on the server, including sensitive files like /etc/passwd, leading to confidential data compromise. The weakness is identified as CWE‑22.

Affected Systems

The affected product is VideoFlow Digital Video Protection DVP 2.10 from VideoFlow Ltd. No other versions are explicitly listed as vulnerable.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity vulnerability that requires authentication on the target system. EPSS data is not available, so the probability of exploitation cannot be quantified, and the vulnerability is not listed in CISA KEV. Based on the description, the likely attack vector is via an authenticated user submitting crafted download requests; the attacker needs valid credentials and can then acquire arbitrary files which may contain credentials or system configuration data.

Generated by OpenCVE AI on April 30, 2026 at 03:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact VideoFlow to obtain and apply an official patch or product update
  • Restrict the permissions of authenticated users so that they cannot access the vulnerable download scripts
  • Add input validation or sanitize the ID parameter to prevent path traversal before it is processed by the scripts

Generated by OpenCVE AI on April 30, 2026 at 03:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Videoflow
Videoflow digital Video Protection
Vendors & Products Videoflow
Videoflow digital Video Protection

Wed, 29 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description VideoFlow Digital Video Protection DVP 2.10 contains an authenticated directory traversal vulnerability that allows authenticated attackers to disclose arbitrary files by injecting path traversal sequences in the ID parameter. Attackers can submit requests to downloadsys.pl, download_xml.pl, download.pl, downloadmib.pl, or downloadFile.pl with directory traversal payloads to read sensitive system files like /etc/passwd.
Title VideoFlow Digital Video Protection DVP 10 Authenticated Directory Traversal 2.10 (X-Prototype-Version: 1.6.0.2)
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Videoflow Digital Video Protection
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-30T14:14:21.159Z

Reserved: 2026-04-29T12:21:33.672Z

Link: CVE-2018-25311

cve-icon Vulnrichment

Updated: 2026-04-30T14:14:05.831Z

cve-icon NVD

Status : Deferred

Published: 2026-04-29T20:16:26.760

Modified: 2026-04-29T21:22:20.120

Link: CVE-2018-25311

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T08:20:31Z

Weaknesses