Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-22723: n/a

0
Medium
VulnerabilityCVE-2024-22723cvecve-2024-22723
Published: Wed Feb 28 2024 (02/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Webtrees 2.1.18 is vulnerable to Directory Traversal. By manipulating the "media_folder" parameter in the URL, an attacker (in this case, an administrator) can navigate beyond the intended directory (the 'media/' directory) to access sensitive files in other parts of the application's file system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:13:43 UTC

Technical Analysis

CVE-2024-22723 is a directory traversal vulnerability identified in Webtrees version 2.1.18, a web-based genealogy application. The flaw arises from insufficient validation of the 'media_folder' parameter in the URL, which is intended to restrict file access to the 'media/' directory. By manipulating this parameter, an attacker with administrator privileges can traverse directories beyond the designated media folder, potentially accessing sensitive files elsewhere on the server's filesystem. This vulnerability is categorized under CWE-31 (Path Traversal), indicating improper sanitization of file path inputs. The CVSS v3.1 base score is 4.9, reflecting a medium severity level, with an attack vector of network (remote), low attack complexity, requiring high privileges (administrator), no user interaction, and impacting confidentiality only. No integrity or availability impacts are noted. There are no known exploits in the wild, and no patches have been published yet. The vulnerability requires authenticated administrator access, limiting the attack surface but still posing a risk if admin credentials are compromised or misused. The lack of user interaction means exploitation can be automated once access is obtained. This vulnerability could allow attackers to read sensitive configuration files, credentials, or other private data stored on the server, potentially leading to further compromise.

Potential Impact

The primary impact of CVE-2024-22723 is unauthorized disclosure of sensitive information due to directory traversal beyond the intended media directory. For organizations using Webtrees 2.1.18, this could expose configuration files, user data, or other critical files stored on the server, undermining confidentiality. Although exploitation requires administrator privileges, if these credentials are compromised or misused, attackers can leverage this vulnerability to gain deeper insight into the system, facilitating further attacks such as privilege escalation or lateral movement. The vulnerability does not affect system integrity or availability directly, but the exposure of sensitive data can have significant operational and reputational consequences. Organizations managing genealogical data, which may include personal and familial information, face privacy risks and potential regulatory compliance issues. The absence of known exploits reduces immediate risk, but the medium severity rating and lack of patches necessitate proactive mitigation. The impact is more pronounced in environments where administrator access controls are weak or where Webtrees is exposed to a broad user base.

Mitigation Recommendations

To mitigate CVE-2024-22723, organizations should first restrict administrator access to trusted personnel and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of credential compromise. Network-level controls should limit access to the Webtrees administration interface to known IP addresses or VPNs. Until an official patch is released, administrators should avoid manipulating the 'media_folder' parameter and monitor web server logs for unusual or unauthorized directory traversal attempts. Implementing web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns targeting the 'media_folder' parameter can provide additional protection. Regularly auditing file system permissions to ensure that the Webtrees application user has minimal access rights beyond the necessary directories can limit the impact of exploitation. Organizations should also maintain up-to-date backups of critical data and prepare for rapid patch deployment once a fix becomes available. Finally, monitoring for leaked administrator credentials and conducting periodic security awareness training can help prevent unauthorized access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d4db7ef31ef0b570208

Added to database: 2/25/2026, 9:44:45 PM

Last enriched: 2/28/2026, 9:13:43 AM

Last updated: 4/12/2026, 3:34:01 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses