A Path Traversal vulnerability has been identified in the Email Security appliance allows an attacker to manipulate file system paths by injecting crafted directory-traversal sequences (such as ../) and may access files and directories outside the intended restricted path.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 20 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Nov 2025 12:30:00 +0000

Type Values Removed Values Added
Description A Path Traversal vulnerability has been identified in the Email Security appliance allows an attacker to manipulate file system paths by injecting crafted directory-traversal sequences (such as ../) and may access files and directories outside the intended restricted path.
Weaknesses CWE-23
References

cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2025-11-20T18:30:31.164Z

Reserved: 2025-04-16T08:34:59.662Z

Link: CVE-2025-40605

cve-icon Vulnrichment

Updated: 2025-11-20T18:30:16.655Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-20T15:17:28.917

Modified: 2025-11-21T15:13:13.800

Link: CVE-2025-40605

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.