CVE-2025-11031

A flaw has been found in DataTables up to 1.10.13. The affected element is an unknown function of the file /examples/resources/examples.php. This manipulation of the argument src causes path traversal. It is possible to initiate the attack remotely. The exploit has been published and may be used. Upgrading to version 1.10.15 is sufficient to fix this issue. Patch name: 3b24f99ac4ddb7f9072076b0d07f0b1a408f177a. Upgrading the affected component is advised. This vulnerability was initially reported for code-projects Faculty Management System but appears to affect DataTables as an upstream component instead. The vendor of DataTables explains: "I would suggest that the author upgrade to the latest versions of DataTables (actually, they shouldn't really be deploying that file to their own server at all - it is only relevant for the DataTables examples)."
Configurations

Configuration 1 (hide)

cpe:2.3:a:sprymedia:datatables:*:*:*:*:*:jquery:*:*

History

07 Oct 2025, 18:31

Type Values Removed Values Added
First Time Sprymedia
Sprymedia datatables
CPE cpe:2.3:a:sprymedia:datatables:*:*:*:*:*:jquery:*:*
References () https://github.com/DataTables/DataTables/commit/3b24f99ac4ddb7f9072076b0d07f0b1a408f177a - () https://github.com/DataTables/DataTables/commit/3b24f99ac4ddb7f9072076b0d07f0b1a408f177a - Patch
References () https://github.com/DataTables/DataTables/releases/tag/1.10.15 - () https://github.com/DataTables/DataTables/releases/tag/1.10.15 - Release Notes
References () https://github.com/xiaoliyu-1/Faculty-Management-System-examples.php-v.1.0-Path-Traversal/blob/main/report.md - () https://github.com/xiaoliyu-1/Faculty-Management-System-examples.php-v.1.0-Path-Traversal/blob/main/report.md - Exploit, Third Party Advisory
References () https://github.com/xiaoliyu-1/Faculty-Management-System-examples.php-v.1.0-Path-Traversal/blob/main/report.md#url - () https://github.com/xiaoliyu-1/Faculty-Management-System-examples.php-v.1.0-Path-Traversal/blob/main/report.md#url - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.325970 - () https://vuldb.com/?ctiid.325970 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.325970 - () https://vuldb.com/?id.325970 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.657918 - () https://vuldb.com/?submit.657918 - Third Party Advisory, VDB Entry

26 Sep 2025, 18:15

Type Values Removed Values Added
References () https://github.com/xiaoliyu-1/Faculty-Management-System-examples.php-v.1.0-Path-Traversal/blob/main/report.md - () https://github.com/xiaoliyu-1/Faculty-Management-System-examples.php-v.1.0-Path-Traversal/blob/main/report.md -
References () https://github.com/xiaoliyu-1/Faculty-Management-System-examples.php-v.1.0-Path-Traversal/blob/main/report.md#url - () https://github.com/xiaoliyu-1/Faculty-Management-System-examples.php-v.1.0-Path-Traversal/blob/main/report.md#url -

26 Sep 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-26 17:15

Updated : 2025-10-07 18:31


NVD link : CVE-2025-11031

Mitre link : CVE-2025-11031

CVE.ORG link : CVE-2025-11031


JSON object : View

Products Affected

sprymedia

  • datatables
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')