Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13199: Path Traversal: '../filedir' in code-projects Email Logging Interface

0
Medium
VulnerabilityCVE-2025-13199cvecve-2025-13199
Published: Sat Nov 15 2025 (11/15/2025, 10:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Email Logging Interface

Description

A vulnerability was found in code-projects Email Logging Interface 2.0. Affected is an unknown function of the file signup.cpp. The manipulation of the argument Username results in path traversal: '../filedir'. The attack is only possible with local access. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 11/22/2025, 10:53:37 UTC

Technical Analysis

CVE-2025-13199 is a path traversal vulnerability identified in version 2.0 of the code-projects Email Logging Interface, specifically within an unknown function in the signup.cpp source file. The vulnerability arises from improper validation of the Username parameter, which can be manipulated to include directory traversal sequences such as '../filedir'. This allows an attacker with local access and limited privileges to access or potentially modify files outside the intended directory scope. The attack vector is local, meaning remote exploitation is not feasible without prior access. The vulnerability does not require user interaction, but it does require the attacker to have at least limited privileges on the affected system. The CVSS 4.0 vector string (AV:L/AC:L/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates that the attack is local with low complexity, requires privileges, no user interaction, and results in low confidentiality, integrity, and availability impacts. No patches or fixes have been publicly linked yet, and no known exploits are currently in the wild, although the exploit code has been made public. The vulnerability could allow unauthorized file access or modification, potentially leading to information disclosure or system manipulation if exploited by an insider or through compromised local accounts.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to internal security. Since exploitation requires local access with limited privileges, the threat is most significant in environments where multiple users share systems or where insider threats exist. Unauthorized file access or modification could lead to leakage of sensitive email logs or configuration files, undermining confidentiality and integrity. This could impact compliance with GDPR and other data protection regulations if personal data is exposed. Additionally, if critical system files are accessed or altered, availability could be indirectly affected. Organizations relying on the Email Logging Interface for email monitoring or compliance may face operational disruptions or reputational damage. The medium CVSS score reflects the limited scope but non-negligible risk, especially in high-security environments or where local access controls are weak.

Mitigation Recommendations

1. Restrict local access strictly to trusted users and enforce the principle of least privilege to minimize the risk of exploitation. 2. Implement robust input validation and sanitization on the Username parameter to prevent directory traversal sequences. 3. Monitor file system access logs for unusual directory traversal patterns or unauthorized file access attempts. 4. Isolate the Email Logging Interface in a hardened environment or container to limit the impact of potential exploitation. 5. Regularly audit user accounts and permissions on systems running the vulnerable software to detect and remove unnecessary privileges. 6. Apply any vendor patches or updates promptly once available. 7. Consider deploying host-based intrusion detection systems (HIDS) to alert on suspicious local activity. 8. Educate internal users about the risks of local privilege misuse and enforce strong authentication mechanisms to reduce insider threat risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T16:16:24.885Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69185a1a429a1e97bc072ae6

Added to database: 11/15/2025, 10:46:50 AM

Last enriched: 11/22/2025, 10:53:37 AM

Last updated: 2/5/2026, 1:31:38 PM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats