Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34045: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Shenzhen Yuanmengyun Technology Co., Ltd. WeiPHP

0
High
VulnerabilityCVE-2025-34045cvecve-2025-34045cwe-22
Published: Thu Jun 26 2025 (06/26/2025, 15:51:37 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Yuanmengyun Technology Co., Ltd.
Product: WeiPHP

Description

A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

AI-Powered Analysis

AILast updated: 12/01/2025, 23:22:00 UTC

Technical Analysis

CVE-2025-34045 is a path traversal vulnerability classified under CWE-22 affecting WeiPHP version 5.0, a framework designed for developing WeChat public account platforms. The vulnerability resides in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint. Due to insufficient input validation, attackers can craft POST requests that include directory traversal sequences (e.g., ../) to access files outside the intended directory scope. This flaw allows unauthenticated remote attackers to read arbitrary files on the server, including sensitive configuration files and source code, which could lead to further compromise or information leakage. The vulnerability does not require any privileges or user interaction, making it highly exploitable remotely. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects network attack vector, low complexity, no authentication or user interaction, and high confidentiality impact. Although no public exploit code is currently known, Shadowserver Foundation observed exploitation attempts in February 2025, indicating active reconnaissance or targeted attacks. WeiPHP is primarily used in Chinese digital ecosystems but has international deployments due to WeChat's global presence. The lack of official patches at the time of publication increases the urgency for organizations to implement compensating controls.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive information such as internal configuration files, credentials, and source code. This exposure can facilitate further attacks, including privilege escalation, lateral movement, or data exfiltration. Organizations relying on WeiPHP 5.0 for WeChat public account management or integration risk operational disruption and reputational damage if sensitive data is leaked. Given the unauthenticated nature of the exploit, attackers can scan and target vulnerable servers en masse, increasing the likelihood of compromise. The impact is particularly critical for sectors handling sensitive personal data or intellectual property, such as finance, healthcare, and technology. Additionally, exposure of source code could reveal other security weaknesses, compounding the risk. The vulnerability undermines confidentiality without affecting integrity or availability directly but can be a stepping stone for more severe attacks.

Mitigation Recommendations

1. Immediately restrict access to the /public/index.php/material/Material/_download_imgage endpoint using network-level controls such as firewalls or web application firewalls (WAFs) to block suspicious requests containing directory traversal patterns. 2. Implement strict input validation and sanitization on the picUrl parameter to reject any input containing traversal sequences (e.g., ../) or disallowed characters. 3. Employ a whitelist approach for file paths or names that can be accessed through this endpoint, ensuring only legitimate files are retrievable. 4. Monitor web server and application logs for unusual access patterns or repeated attempts to exploit directory traversal. 5. Isolate WeiPHP instances in segmented network zones to limit potential lateral movement if compromised. 6. Engage with the vendor or community to obtain patches or updates addressing this vulnerability and apply them promptly once available. 7. Conduct security audits and penetration testing focused on file access endpoints to identify similar weaknesses. 8. Educate development teams on secure coding practices to prevent path traversal and related vulnerabilities in future releases.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.547Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685d6fabca1063fb8742bc04

Added to database: 6/26/2025, 4:04:59 PM

Last enriched: 12/1/2025, 11:22:00 PM

Last updated: 1/7/2026, 3:24:06 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats