A vulnerability classified as problematic was found in ChestnutCMS 1.5.2. This vulnerability affects the function renameFile of the file /cms/file/rename. The manipulation of the argument rename leads to path traversal. The exploit has been disclosed to the public and may be used.
History

Mon, 12 May 2025 21:00:00 +0000

Type Values Removed Values Added
First Time appeared 1000mz
1000mz chestnutcms
CPEs cpe:2.3:a:1000mz:chestnutcms:1.5.2:*:*:*:*:*:*:*
Vendors & Products 1000mz
1000mz chestnutcms

Wed, 12 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Mar 2025 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability classified as problematic was found in ChestnutCMS 1.5.2. This vulnerability affects the function renameFile of the file /cms/file/rename. The manipulation of the argument rename leads to path traversal. The exploit has been disclosed to the public and may be used.
Title ChestnutCMS rename renameFile path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 2.7, 'vector': 'AV:A/AC:L/Au:S/C:N/I:P/A:N'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-03-06T16:31:04.530Z

Updated: 2025-03-12T21:12:05.980Z

Reserved: 2025-03-06T08:55:25.149Z

Link: CVE-2025-2032

cve-icon Vulnrichment

Updated: 2025-03-12T21:11:53.162Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-06T17:15:24.297

Modified: 2025-05-12T20:43:29.347

Link: CVE-2025-2032

cve-icon Redhat

No data.