A vulnerability in QCMS version 6.0.5 allows authenticated users to read arbitrary files from the server due to insufficient validation of the "Name" parameter in the backend template editor. By manipulating the parameter, attackers can perform directory traversal and access sensitive files outside the intended template directory, potentially exposing system configuration, PHP source code, or other sensitive information.
History

Thu, 07 Aug 2025 07:30:00 +0000

Type Values Removed Values Added
First Time appeared Qcms
Qcms qcms
Vendors & Products Qcms
Qcms qcms

Wed, 06 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in QCMS version 6.0.5 allows authenticated users to read arbitrary files from the server due to insufficient validation of the "Name" parameter in the backend template editor. By manipulating the parameter, attackers can perform directory traversal and access sensitive files outside the intended template directory, potentially exposing system configuration, PHP source code, or other sensitive information.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-08-06T00:00:00.000Z

Updated: 2025-08-06T19:23:57.489Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50233

cve-icon Vulnrichment

Updated: 2025-08-06T19:23:52.614Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-06T15:15:32.013

Modified: 2025-08-06T20:23:37.600

Link: CVE-2025-50233

cve-icon Redhat

No data.