A vulnerability in QCMS version 6.0.5 allows authenticated users to read arbitrary files from the server due to insufficient validation of the "Name" parameter in the backend template editor. By manipulating the parameter, attackers can perform directory traversal and access sensitive files outside the intended template directory, potentially exposing system configuration, PHP source code, or other sensitive information.
References
Link | Resource |
---|---|
https://github.com/xiaoyangsec/cve | Exploit Third Party Advisory |
https://github.com/xiaoyangsec/cve/blob/main/README.md | Exploit Third Party Advisory |
Configurations
History
23 Sep 2025, 18:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/xiaoyangsec/cve - Exploit, Third Party Advisory | |
References | () https://github.com/xiaoyangsec/cve/blob/main/README.md - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:q-cms:qcms:6.0.5:*:*:*:*:*:*:* | |
First Time |
Q-cms
Q-cms qcms |
06 Aug 2025, 20:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-20 |
06 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-06 15:15
Updated : 2025-09-23 18:34
NVD link : CVE-2025-50233
Mitre link : CVE-2025-50233
CVE.ORG link : CVE-2025-50233
JSON object : View
Products Affected
q-cms
- qcms
CWE
CWE-20
Improper Input Validation