EduSoho versions prior to 22.4.7 contain an arbitrary file read vulnerability in the classroom-course-statistics export functionality. A remote, unauthenticated attacker can supply crafted path traversal sequences in the fileNames[] parameter to read arbitrary files from the server filesystem, including application configuration files such as config/parameters.yml that may contain secrets and database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2026-01-19 (UTC).

Project Subscriptions

Vendors Products
Hangzhou Kuozhi Network Technology Subscribe
Edusoho Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Hangzhou Kuozhi Network Technology
Hangzhou Kuozhi Network Technology edusoho
Vendors & Products Hangzhou Kuozhi Network Technology
Hangzhou Kuozhi Network Technology edusoho

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description EduSoho versions prior to 22.4.7 contain an arbitrary file read vulnerability in the classroom-course-statistics export functionality. A remote, unauthenticated attacker can supply crafted path traversal sequences in the fileNames[] parameter to read arbitrary files from the server filesystem, including application configuration files such as config/parameters.yml that may contain secrets and database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2026-01-19 (UTC).
Title EduSoho < 22.4.7 Arbitrary File Read via classroom-course-statistics
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-22T18:31:38.631Z

Reserved: 2026-01-21T21:28:45.232Z

Link: CVE-2023-7335

cve-icon Vulnrichment

Updated: 2026-01-22T18:31:30.559Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-22T17:15:53.117

Modified: 2026-01-26T15:04:33.567

Link: CVE-2023-7335

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-23T10:27:17Z

Weaknesses