Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15138: Path Traversal in prasathmani TinyFileManager

0
Medium
VulnerabilityCVE-2025-15138cvecve-2025-15138
Published: Sun Dec 28 2025 (12/28/2025, 13:32:08 UTC)
Source: CVE Database V5
Vendor/Project: prasathmani
Product: TinyFileManager

Description

A flaw has been found in prasathmani TinyFileManager up to 2.6. Affected by this issue is some unknown functionality of the file tinyfilemanager.php. This manipulation of the argument fullpath causes path traversal. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:34:40 UTC

Technical Analysis

CVE-2025-15138 is a path traversal vulnerability identified in the prasathmani TinyFileManager software, specifically affecting versions 2.0 through 2.6. The vulnerability arises from improper validation of the 'fullpath' parameter in the tinyfilemanager.php script, which allows an attacker to manipulate the file path input to access directories and files outside the intended directory scope. This type of flaw enables attackers to read arbitrary files on the server, potentially exposing sensitive information or configuration files. The vulnerability can be exploited remotely without user interaction; however, it requires the attacker to have high privileges on the system, which limits the ease of exploitation. The vendor was notified early but has not issued any patches or advisories, increasing the risk for users who continue to run vulnerable versions. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H means high privileges required, so this is a discrepancy in the vector; assuming PR:H means high privileges required), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). No known exploits are currently reported in the wild, but proof-of-concept code has been published, which could facilitate future attacks. This vulnerability is significant for environments where TinyFileManager is used to manage files on web servers, as it could lead to unauthorized file disclosure and potential further compromise if sensitive files are accessed.

Potential Impact

For European organizations, the impact of CVE-2025-15138 depends largely on the deployment context of TinyFileManager. Organizations using this tool for web-based file management could face unauthorized disclosure of sensitive files, including configuration files, credentials, or personal data, potentially violating GDPR requirements. The path traversal could also be leveraged as a foothold for further attacks if attackers gain access to critical system files. However, the requirement for high privileges to exploit this vulnerability limits the risk to insider threats or attackers who have already compromised a user account with elevated rights. The lack of vendor response and patches increases the risk exposure for organizations that have not implemented compensating controls. In sectors such as finance, healthcare, and government within Europe, where data confidentiality is paramount, this vulnerability could lead to significant compliance and reputational damage if exploited.

Mitigation Recommendations

Given the absence of an official patch from the vendor, European organizations should implement the following mitigations: 1) Restrict access to TinyFileManager interfaces to trusted networks and authenticated users with the minimum necessary privileges to reduce exposure. 2) Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the 'fullpath' parameter. 3) Conduct thorough audits of file permissions and ensure that the web server user has minimal access rights, preventing unauthorized file reads outside designated directories. 4) Monitor logs for unusual access patterns or attempts to manipulate file paths. 5) Consider replacing TinyFileManager with alternative, actively maintained file management tools that have robust security practices. 6) If feasible, implement network segmentation to isolate systems running TinyFileManager from critical infrastructure. 7) Prepare incident response plans to quickly address any exploitation attempts. These steps go beyond generic advice by focusing on access control, monitoring, and compensating controls tailored to the specific vulnerability vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-27T10:07:46.338Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b8db813ff03e2bf3b8

Added to database: 12/30/2025, 10:22:48 PM

Last enriched: 12/30/2025, 11:34:40 PM

Last updated: 2/7/2026, 3:52:49 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats