CVE-2025-13199: Path Traversal: '../filedir' in code-projects Email Logging Interface
A vulnerability was found in code-projects Email Logging Interface 2.0. Affected is an unknown function of the file signup.cpp. The manipulation of the argument Username results in path traversal: '../filedir'. The attack is only possible with local access. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-13199 is a path traversal vulnerability identified in version 2.0 of the code-projects Email Logging Interface, specifically within an unknown function in the signup.cpp source file. The vulnerability arises from improper validation of the Username parameter, which can be manipulated to include directory traversal sequences such as '../filedir'. This allows an attacker with local access and limited privileges to access or potentially modify files outside the intended directory scope. The attack vector is local, meaning remote exploitation is not feasible without prior access. The vulnerability does not require user interaction, but it does require the attacker to have at least limited privileges on the affected system. The CVSS 4.0 vector string (AV:L/AC:L/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates that the attack is local with low complexity, requires privileges, no user interaction, and results in low confidentiality, integrity, and availability impacts. No patches or fixes have been publicly linked yet, and no known exploits are currently in the wild, although the exploit code has been made public. The vulnerability could allow unauthorized file access or modification, potentially leading to information disclosure or system manipulation if exploited by an insider or through compromised local accounts.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to internal security. Since exploitation requires local access with limited privileges, the threat is most significant in environments where multiple users share systems or where insider threats exist. Unauthorized file access or modification could lead to leakage of sensitive email logs or configuration files, undermining confidentiality and integrity. This could impact compliance with GDPR and other data protection regulations if personal data is exposed. Additionally, if critical system files are accessed or altered, availability could be indirectly affected. Organizations relying on the Email Logging Interface for email monitoring or compliance may face operational disruptions or reputational damage. The medium CVSS score reflects the limited scope but non-negligible risk, especially in high-security environments or where local access controls are weak.
Mitigation Recommendations
1. Restrict local access strictly to trusted users and enforce the principle of least privilege to minimize the risk of exploitation. 2. Implement robust input validation and sanitization on the Username parameter to prevent directory traversal sequences. 3. Monitor file system access logs for unusual directory traversal patterns or unauthorized file access attempts. 4. Isolate the Email Logging Interface in a hardened environment or container to limit the impact of potential exploitation. 5. Regularly audit user accounts and permissions on systems running the vulnerable software to detect and remove unnecessary privileges. 6. Apply any vendor patches or updates promptly once available. 7. Consider deploying host-based intrusion detection systems (HIDS) to alert on suspicious local activity. 8. Educate internal users about the risks of local privilege misuse and enforce strong authentication mechanisms to reduce insider threat risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-13199: Path Traversal: '../filedir' in code-projects Email Logging Interface
Description
A vulnerability was found in code-projects Email Logging Interface 2.0. Affected is an unknown function of the file signup.cpp. The manipulation of the argument Username results in path traversal: '../filedir'. The attack is only possible with local access. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13199 is a path traversal vulnerability identified in version 2.0 of the code-projects Email Logging Interface, specifically within an unknown function in the signup.cpp source file. The vulnerability arises from improper validation of the Username parameter, which can be manipulated to include directory traversal sequences such as '../filedir'. This allows an attacker with local access and limited privileges to access or potentially modify files outside the intended directory scope. The attack vector is local, meaning remote exploitation is not feasible without prior access. The vulnerability does not require user interaction, but it does require the attacker to have at least limited privileges on the affected system. The CVSS 4.0 vector string (AV:L/AC:L/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates that the attack is local with low complexity, requires privileges, no user interaction, and results in low confidentiality, integrity, and availability impacts. No patches or fixes have been publicly linked yet, and no known exploits are currently in the wild, although the exploit code has been made public. The vulnerability could allow unauthorized file access or modification, potentially leading to information disclosure or system manipulation if exploited by an insider or through compromised local accounts.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to internal security. Since exploitation requires local access with limited privileges, the threat is most significant in environments where multiple users share systems or where insider threats exist. Unauthorized file access or modification could lead to leakage of sensitive email logs or configuration files, undermining confidentiality and integrity. This could impact compliance with GDPR and other data protection regulations if personal data is exposed. Additionally, if critical system files are accessed or altered, availability could be indirectly affected. Organizations relying on the Email Logging Interface for email monitoring or compliance may face operational disruptions or reputational damage. The medium CVSS score reflects the limited scope but non-negligible risk, especially in high-security environments or where local access controls are weak.
Mitigation Recommendations
1. Restrict local access strictly to trusted users and enforce the principle of least privilege to minimize the risk of exploitation. 2. Implement robust input validation and sanitization on the Username parameter to prevent directory traversal sequences. 3. Monitor file system access logs for unusual directory traversal patterns or unauthorized file access attempts. 4. Isolate the Email Logging Interface in a hardened environment or container to limit the impact of potential exploitation. 5. Regularly audit user accounts and permissions on systems running the vulnerable software to detect and remove unnecessary privileges. 6. Apply any vendor patches or updates promptly once available. 7. Consider deploying host-based intrusion detection systems (HIDS) to alert on suspicious local activity. 8. Educate internal users about the risks of local privilege misuse and enforce strong authentication mechanisms to reduce insider threat risks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T16:16:24.885Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69185a1a429a1e97bc072ae6
Added to database: 11/15/2025, 10:46:50 AM
Last enriched: 11/22/2025, 10:53:37 AM
Last updated: 2/5/2026, 1:31:38 PM
Views: 101
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Italy Averted Russian-Linked Cyberattacks Targeting Winter Olympics Websites, Foreign Minister Says
MediumCVE-2026-1517: SQL Injection in iomad
MediumCVE-2026-23572: CWE-863 Incorrect Authorization in TeamViewer Remote
HighCVE-2026-1966: CWE-522 Insufficiently Protected Credentials in YugabyteDB Inc YugabyteDB Anywhere
LowCVE-2026-23797: CWE-256 Plaintext Storage of a Password in OpenSolution Quick.Cart
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.