download functionality was identified. This vulnerability allows
unauthenticated users to download arbitrary files, in the context of the
application server, from the Linux server.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-15430 | A Path traversal vulnerability in the file download functionality was identified. This vulnerability allows unauthenticated users to download arbitrary files, in the context of the application server, from the Linux server. |
Solution
Update to versions 5.4.12, 5.5.4, 5.6.3 or higher.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.cirosec.de/sa/sa-2025-003 |
|
Fri, 16 May 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 May 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Path traversal vulnerability in the file download functionality was identified. This vulnerability allows unauthenticated users to download arbitrary files, in the context of the application server, from the Linux server. | |
| Title | Local file inclusion vulnerability in LIVE CONTRACT | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cirosec
Published:
Updated: 2025-05-16T13:04:26.030Z
Reserved: 2025-03-14T12:24:17.830Z
Link: CVE-2025-2305
Updated: 2025-05-16T13:04:22.444Z
Status : Awaiting Analysis
Published: 2025-05-16T13:15:52.063
Modified: 2025-05-16T14:42:18.700
Link: CVE-2025-2305
No data.
OpenCVE Enrichment
No data.
EUVD