Description
i-doit CMDB 1.12 contains an arbitrary file download vulnerability that allows authenticated attackers to download sensitive files by manipulating the file parameter in index.php. Attackers can send GET requests to index.php with file_manager=image and supply arbitrary file paths like src/config.inc.php to retrieve configuration files and sensitive system data.
Published: 2026-03-21
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Information Disclosure (file download)
Action: Patch Update
AI Analysis

Impact

i-doit CMDB version 1.12 contains a flaw that lets an authenticated user download any file present on the server by manipulating the file_manager parameter in index.php. By sending a crafted GET request the attacker can retrieve configuration files, such as config.inc.php, revealing sensitive system data. This represents an Arbitrary File Download weakness (CWE-434).

Affected Systems

The vulnerability affects I-Doit’s CMDB product, specifically version 1.12. No other versions have been reported as impacted.

Risk and Exploitability

The CVSS score of 7.1 places this issue in the high severity range, and the EPSS score indicates a low probability of exploitation under current conditions. It is not listed in CISA’s KEV catalog. Exploitation requires the attacker to be authenticated within the application; after login, an attacker can issue a simple GET request to index.php with the file_manager parameter to obtain arbitrary files. Successful exploitation leads to confidential data exposure and may facilitate further compromise.

Generated by OpenCVE AI on March 24, 2026 at 21:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether a newer version of i-doit CMDB is available and upgrade immediately.
  • Restrict the file_manager functionality to privileged users only, or disable it entirely if not needed.
  • If an update is not yet available, block requests containing the file_manager parameter with arbitrary paths using web‑application or firewall rules.
  • Continuously monitor web server logs for suspicious file download attempts to detect potential use of the exploit.

Generated by OpenCVE AI on March 24, 2026 at 21:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared I-doit i-doit
CPEs cpe:2.3:a:i-doit:i-doit:1.12:*:*:*:*:*:*:*
Vendors & Products I-doit i-doit

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared I-doit
I-doit doit Cmdb
Vendors & Products I-doit
I-doit doit Cmdb

Sat, 21 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description i-doit CMDB 1.12 contains an arbitrary file download vulnerability that allows authenticated attackers to download sensitive files by manipulating the file parameter in index.php. Attackers can send GET requests to index.php with file_manager=image and supply arbitrary file paths like src/config.inc.php to retrieve configuration files and sensitive system data.
Title i-doit CMDB 1.12 Arbitrary File Download via file_manager Parameter
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-24T15:15:06.377Z

Reserved: 2026-03-21T15:29:35.182Z

Link: CVE-2019-25582

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-21T16:16:02.497

Modified: 2026-03-24T20:36:08.393

Link: CVE-2019-25582

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:47:01Z

Weaknesses