Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 26 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 26 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw has been found in DataTables up to 1.10.13. The affected element is an unknown function of the file /examples/resources/examples.php. This manipulation of the argument src causes path traversal. It is possible to initiate the attack remotely. The exploit has been published and may be used. Upgrading to version 1.10.15 is sufficient to fix this issue. Patch name: 3b24f99ac4ddb7f9072076b0d07f0b1a408f177a. Upgrading the affected component is advised. This vulnerability was initially reported for code-projects Faculty Management System but appears to affect DataTables as an upstream component instead. The vendor of DataTables explains: "I would suggest that the author upgrade to the latest versions of DataTables (actually, they shouldn't really be deploying that file to their own server at all - it is only relevant for the DataTables examples)." | |
Title | DataTables examples.php path traversal | |
Weaknesses | CWE-22 | |
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-26T17:50:52.515Z
Reserved: 2025-09-26T08:38:39.146Z
Link: CVE-2025-11031

Updated: 2025-09-26T17:34:40.160Z

Status : Received
Published: 2025-09-26T17:15:35.257
Modified: 2025-09-26T18:15:34.970
Link: CVE-2025-11031

No data.

No data.