Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34045: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Shenzhen Yuanmengyun Technology Co., Ltd. WeiPHP

0
High
VulnerabilityCVE-2025-34045cvecve-2025-34045cwe-22
Published: Thu Jun 26 2025 (06/26/2025, 15:51:37 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Yuanmengyun Technology Co., Ltd.
Product: WeiPHP

Description

A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

AI-Powered Analysis

AILast updated: 11/17/2025, 22:13:29 UTC

Technical Analysis

CVE-2025-34045 is a path traversal vulnerability classified under CWE-22 found in WeiPHP version 5.0, a framework used for developing WeChat public account platforms. The vulnerability arises from insufficient input validation on the picUrl parameter within the /public/index.php/material/Material/_download_imgage endpoint. An attacker can craft a POST request with specially designed path traversal sequences (e.g., ../) in the picUrl parameter to access files outside the intended directory scope. This allows unauthenticated remote attackers to read arbitrary files on the server, including sensitive configuration files, source code, or other data that could facilitate further attacks or data breaches. The vulnerability does not require any privileges or user interaction, making it highly exploitable remotely. The CVSS 4.0 score of 8.7 reflects its high impact on confidentiality with no integrity or availability impact. The Shadowserver Foundation observed exploitation attempts in February 2025, indicating active reconnaissance or limited exploitation, though no large-scale attacks have been reported. WeiPHP is primarily used in environments integrating WeChat public accounts, which are popular in Chinese and some international markets. The lack of an official patch at the time of reporting increases the urgency for defensive measures. The vulnerability's exploitation could lead to significant data leakage and compromise of the affected web servers.

Potential Impact

For European organizations using WeiPHP 5.0, this vulnerability poses a significant risk of unauthorized disclosure of sensitive information, including internal configuration files and source code. Such exposure can lead to further exploitation, including credential theft, privilege escalation, or supply chain attacks if source code integrity is compromised. Organizations operating WeChat public account platforms or integrating Chinese social media services may be particularly targeted. The breach of confidentiality could damage organizational reputation, violate data protection regulations such as GDPR, and result in financial penalties. Additionally, attackers gaining insight into internal configurations could facilitate lateral movement or persistent access. The vulnerability's unauthenticated and remote exploitability increases the likelihood of opportunistic attacks, especially in sectors with high-value data such as finance, telecommunications, and government services. Given the growing use of Chinese technology platforms in Europe, the impact could be widespread if not mitigated promptly.

Mitigation Recommendations

1. Monitor official channels from Shenzhen Yuanmengyun Technology Co., Ltd. for patches or updates addressing CVE-2025-34045 and apply them immediately upon release. 2. Until patches are available, restrict access to the /public/index.php/material/Material/_download_imgage endpoint using network-level controls such as IP whitelisting or VPN access to limit exposure. 3. Implement strict input validation and sanitization on the picUrl parameter to reject any path traversal sequences (e.g., ../) at the web application firewall (WAF) or application level. 4. Deploy or tune WAF rules to detect and block suspicious POST requests targeting the vulnerable endpoint. 5. Conduct thorough code reviews and security testing on WeiPHP deployments to identify and remediate similar input validation weaknesses. 6. Monitor logs for unusual access patterns or attempts to exploit path traversal, enabling early detection of attacks. 7. Consider isolating WeiPHP instances in segmented network zones to limit potential lateral movement if compromised. 8. Educate development and security teams about the risks of path traversal vulnerabilities and secure coding practices to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.547Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685d6fabca1063fb8742bc04

Added to database: 6/26/2025, 4:04:59 PM

Last enriched: 11/17/2025, 10:13:29 PM

Last updated: 11/20/2025, 9:11:27 PM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats