CVE-2025-44137

MapTiler Tileserver-php v2.0 is vulnerable to Directory Traversal. The renderTile function within tileserver.php is responsible for delivering tiles that are stored as files on the server via web request. Creating the path to a file allows the insertion of "../" and thus read any file on the web server. Affected GET parameters are "TileMatrix", "TileRow", "TileCol" and "Format"
Configurations

Configuration 1 (hide)

cpe:2.3:a:maptiler:tileserver_php:2.0:*:*:*:*:*:*:*

History

06 Aug 2025, 20:48

Type Values Removed Values Added
CPE cpe:2.3:a:maptiler:tileserver_php:2.0:*:*:*:*:*:*:*
References () https://github.com/maptiler/tileserver-php/issues/167 - () https://github.com/maptiler/tileserver-php/issues/167 - Exploit, Issue Tracking
References () https://github.com/mheranco/CVE-2025-44137 - () https://github.com/mheranco/CVE-2025-44137 - Exploit
First Time Maptiler
Maptiler tileserver Php

31 Jul 2025, 18:42

Type Values Removed Values Added
Summary
  • (es) MapTiler Tileserver-php v2.0 es vulnerable a Directory Traversal. La función renderTile de tileserver.php se encarga de entregar los mosaicos almacenados como archivos en el servidor mediante una solicitud web. Crear la ruta a un archivo permite insertar "../" y, por lo tanto, leer cualquier archivo en el servidor web. Los parámetros GET afectados son "TileMatrix", "TileRow", "TileCol" y "Format".

29 Jul 2025, 18:15

Type Values Removed Values Added
CWE CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.2

29 Jul 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-29 17:15

Updated : 2025-08-06 20:48


NVD link : CVE-2025-44137

Mitre link : CVE-2025-44137

CVE.ORG link : CVE-2025-44137


JSON object : View

Products Affected

maptiler

  • tileserver_php
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')