CVE-2024-22723: n/a
Webtrees 2.1.18 is vulnerable to Directory Traversal. By manipulating the "media_folder" parameter in the URL, an attacker (in this case, an administrator) can navigate beyond the intended directory (the 'media/' directory) to access sensitive files in other parts of the application's file system.
AI Analysis
Technical Summary
CVE-2024-22723 is a directory traversal vulnerability identified in Webtrees version 2.1.18, a web-based genealogy application. The flaw arises from insufficient validation of the 'media_folder' parameter in the URL, which is intended to restrict file access to the 'media/' directory. By manipulating this parameter, an attacker with administrator privileges can traverse directories beyond the designated media folder, potentially accessing sensitive files elsewhere on the server's filesystem. This vulnerability is categorized under CWE-31 (Path Traversal), indicating improper sanitization of file path inputs. The CVSS v3.1 base score is 4.9, reflecting a medium severity level, with an attack vector of network (remote), low attack complexity, requiring high privileges (administrator), no user interaction, and impacting confidentiality only. No integrity or availability impacts are noted. There are no known exploits in the wild, and no patches have been published yet. The vulnerability requires authenticated administrator access, limiting the attack surface but still posing a risk if admin credentials are compromised or misused. The lack of user interaction means exploitation can be automated once access is obtained. This vulnerability could allow attackers to read sensitive configuration files, credentials, or other private data stored on the server, potentially leading to further compromise.
Potential Impact
The primary impact of CVE-2024-22723 is unauthorized disclosure of sensitive information due to directory traversal beyond the intended media directory. For organizations using Webtrees 2.1.18, this could expose configuration files, user data, or other critical files stored on the server, undermining confidentiality. Although exploitation requires administrator privileges, if these credentials are compromised or misused, attackers can leverage this vulnerability to gain deeper insight into the system, facilitating further attacks such as privilege escalation or lateral movement. The vulnerability does not affect system integrity or availability directly, but the exposure of sensitive data can have significant operational and reputational consequences. Organizations managing genealogical data, which may include personal and familial information, face privacy risks and potential regulatory compliance issues. The absence of known exploits reduces immediate risk, but the medium severity rating and lack of patches necessitate proactive mitigation. The impact is more pronounced in environments where administrator access controls are weak or where Webtrees is exposed to a broad user base.
Mitigation Recommendations
To mitigate CVE-2024-22723, organizations should first restrict administrator access to trusted personnel and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of credential compromise. Network-level controls should limit access to the Webtrees administration interface to known IP addresses or VPNs. Until an official patch is released, administrators should avoid manipulating the 'media_folder' parameter and monitor web server logs for unusual or unauthorized directory traversal attempts. Implementing web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns targeting the 'media_folder' parameter can provide additional protection. Regularly auditing file system permissions to ensure that the Webtrees application user has minimal access rights beyond the necessary directories can limit the impact of exploitation. Organizations should also maintain up-to-date backups of critical data and prepare for rapid patch deployment once a fix becomes available. Finally, monitoring for leaked administrator credentials and conducting periodic security awareness training can help prevent unauthorized access.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Sweden, Italy, Spain
CVE-2024-22723: n/a
Description
Webtrees 2.1.18 is vulnerable to Directory Traversal. By manipulating the "media_folder" parameter in the URL, an attacker (in this case, an administrator) can navigate beyond the intended directory (the 'media/' directory) to access sensitive files in other parts of the application's file system.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-22723 is a directory traversal vulnerability identified in Webtrees version 2.1.18, a web-based genealogy application. The flaw arises from insufficient validation of the 'media_folder' parameter in the URL, which is intended to restrict file access to the 'media/' directory. By manipulating this parameter, an attacker with administrator privileges can traverse directories beyond the designated media folder, potentially accessing sensitive files elsewhere on the server's filesystem. This vulnerability is categorized under CWE-31 (Path Traversal), indicating improper sanitization of file path inputs. The CVSS v3.1 base score is 4.9, reflecting a medium severity level, with an attack vector of network (remote), low attack complexity, requiring high privileges (administrator), no user interaction, and impacting confidentiality only. No integrity or availability impacts are noted. There are no known exploits in the wild, and no patches have been published yet. The vulnerability requires authenticated administrator access, limiting the attack surface but still posing a risk if admin credentials are compromised or misused. The lack of user interaction means exploitation can be automated once access is obtained. This vulnerability could allow attackers to read sensitive configuration files, credentials, or other private data stored on the server, potentially leading to further compromise.
Potential Impact
The primary impact of CVE-2024-22723 is unauthorized disclosure of sensitive information due to directory traversal beyond the intended media directory. For organizations using Webtrees 2.1.18, this could expose configuration files, user data, or other critical files stored on the server, undermining confidentiality. Although exploitation requires administrator privileges, if these credentials are compromised or misused, attackers can leverage this vulnerability to gain deeper insight into the system, facilitating further attacks such as privilege escalation or lateral movement. The vulnerability does not affect system integrity or availability directly, but the exposure of sensitive data can have significant operational and reputational consequences. Organizations managing genealogical data, which may include personal and familial information, face privacy risks and potential regulatory compliance issues. The absence of known exploits reduces immediate risk, but the medium severity rating and lack of patches necessitate proactive mitigation. The impact is more pronounced in environments where administrator access controls are weak or where Webtrees is exposed to a broad user base.
Mitigation Recommendations
To mitigate CVE-2024-22723, organizations should first restrict administrator access to trusted personnel and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of credential compromise. Network-level controls should limit access to the Webtrees administration interface to known IP addresses or VPNs. Until an official patch is released, administrators should avoid manipulating the 'media_folder' parameter and monitor web server logs for unusual or unauthorized directory traversal attempts. Implementing web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns targeting the 'media_folder' parameter can provide additional protection. Regularly auditing file system permissions to ensure that the Webtrees application user has minimal access rights beyond the necessary directories can limit the impact of exploitation. Organizations should also maintain up-to-date backups of critical data and prepare for rapid patch deployment once a fix becomes available. Finally, monitoring for leaked administrator credentials and conducting periodic security awareness training can help prevent unauthorized access.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-01-11T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d4db7ef31ef0b570208
Added to database: 2/25/2026, 9:44:45 PM
Last enriched: 2/28/2026, 9:13:43 AM
Last updated: 4/12/2026, 3:34:01 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.