CVE-2025-2032

A vulnerability classified as problematic was found in ChestnutCMS 1.5.2. This vulnerability affects the function renameFile of the file /cms/file/rename. The manipulation of the argument rename leads to path traversal. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/IceFoxH/VULN/issues/7 Exploit
https://vuldb.com/?ctiid.298774 Permissions Required VDB Entry
https://vuldb.com/?id.298774 Third Party Advisory VDB Entry
https://vuldb.com/?submit.512030 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:1000mz:chestnutcms:1.5.2:*:*:*:*:*:*:*

History

12 May 2025, 20:43

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como problemática en ChestnutCMS 1.5.2. Esta vulnerabilidad afecta a la función renameFile del archivo /cms/file/rename. La manipulación del argumento rename provoca un path traversal. La vulnerabilidad se ha hecho pública y puede utilizarse.
References () https://github.com/IceFoxH/VULN/issues/7 - () https://github.com/IceFoxH/VULN/issues/7 - Exploit
References () https://vuldb.com/?ctiid.298774 - () https://vuldb.com/?ctiid.298774 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.298774 - () https://vuldb.com/?id.298774 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.512030 - () https://vuldb.com/?submit.512030 - Third Party Advisory, VDB Entry
First Time 1000mz chestnutcms
1000mz
CPE cpe:2.3:a:1000mz:chestnutcms:1.5.2:*:*:*:*:*:*:*

06 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-06 17:15

Updated : 2025-05-12 20:43


NVD link : CVE-2025-2032

Mitre link : CVE-2025-2032

CVE.ORG link : CVE-2025-2032


JSON object : View

Products Affected

1000mz

  • chestnutcms
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')