Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25183: n/a

0
High
VulnerabilityCVE-2024-25183cvecve-2024-25183
Published: Mon Dec 29 2025 (12/29/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

givanz VvvebJs 1.7.2 is vulnerable to Directory Traversal via scan.php.

AI-Powered Analysis

AILast updated: 12/30/2025, 22:36:38 UTC

Technical Analysis

CVE-2024-25183 identifies a directory traversal vulnerability in the givanz VvvebJs 1.7.2 web editor, specifically through the scan.php endpoint. Directory traversal (CWE-22) allows attackers to manipulate file path parameters to access files outside the intended directory scope. This vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Exploiting this flaw, an attacker can read arbitrary files on the server, potentially exposing sensitive configuration files, credentials, or other confidential data. The vulnerability does not affect integrity or availability but severely compromises confidentiality. No patches or fixes are currently linked, and no known exploits have been reported in the wild yet. The vulnerability was reserved in early 2024 and published at the end of 2025. Given the nature of VvvebJs as a web page builder/editor, this vulnerability could be present in web applications that incorporate this component, increasing the attack surface for organizations using it. The lack of authentication requirement and low complexity of attack make this a critical concern for exposed web servers.

Potential Impact

For European organizations, exploitation of CVE-2024-25183 could lead to unauthorized disclosure of sensitive internal files, including credentials, configuration data, or proprietary information. This breach of confidentiality can facilitate further attacks such as privilege escalation or lateral movement within networks. Organizations relying on VvvebJs 1.7.2 in customer-facing or internal web applications are particularly vulnerable. The exposure of sensitive data could result in regulatory non-compliance under GDPR, leading to legal and financial penalties. Additionally, reputational damage could arise from data leaks. Since the vulnerability does not impact system integrity or availability, the primary concern remains data confidentiality. The absence of known exploits currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Immediately identify and inventory all instances of givanz VvvebJs 1.7.2 within your environment, focusing on web applications exposing scan.php. 2. Apply any available patches or updates from the vendor as soon as they are released. 3. If patches are unavailable, implement strict input validation and sanitization on parameters passed to scan.php to prevent directory traversal sequences (e.g., ../). 4. Restrict access to scan.php via web application firewalls (WAFs) or network controls to trusted IPs only. 5. Employ file system permissions to limit the web server's read access to only necessary directories, minimizing the impact of traversal. 6. Monitor web server logs for suspicious requests containing directory traversal patterns. 7. Conduct penetration testing focused on directory traversal to verify mitigation effectiveness. 8. Educate development teams about secure coding practices to prevent similar vulnerabilities in future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450a5db813ff03e2be176

Added to database: 12/30/2025, 10:22:29 PM

Last enriched: 12/30/2025, 10:36:38 PM

Last updated: 2/6/2026, 5:04:30 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats