Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34076: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Microweber Ltd. CMS

0
Medium
VulnerabilityCVE-2025-34076cvecve-2025-34076cwe-22
Published: Wed Jul 02 2025 (07/02/2025, 19:27:03 UTC)
Source: CVE Database V5
Vendor/Project: Microweber Ltd.
Product: CMS

Description

An authenticated local file inclusion vulnerability exists in Microweber CMS versions <= 1.2.11 through misuse of the backup management API. Authenticated users can abuse the /api/BackupV2/upload and /api/BackupV2/download endpoints to read arbitrary files from the underlying filesystem. By specifying an absolute file path in the src parameter of the upload request, the server may relocate or delete the target file depending on the web service user’s privileges. The corresponding download endpoint can then be used to retrieve the file contents, effectively enabling local file disclosure. This behavior stems from insufficient validation of user-supplied paths and inadequate restrictions on file access and backup logic.

AI-Powered Analysis

AILast updated: 11/29/2025, 16:34:47 UTC

Technical Analysis

CVE-2025-34076 is a path traversal vulnerability classified under CWE-22 affecting Microweber CMS versions up to 1.2.11. The vulnerability exists in the backup management API endpoints /api/BackupV2/upload and /api/BackupV2/download. Authenticated users can abuse these endpoints by providing an absolute file path in the 'src' parameter of the upload request. Due to insufficient validation and lack of proper restrictions on file paths, the server may relocate or delete arbitrary files on the filesystem depending on the privileges of the web service user account running the CMS. Subsequently, the download endpoint can be used to retrieve the contents of these files, enabling local file disclosure. This flaw stems from inadequate sanitization of user-supplied input and improper enforcement of directory restrictions within the backup logic. The vulnerability requires authentication but no user interaction, and the attack vector is network-based with low attack complexity. The CVSS v4.0 score is 6.1, reflecting medium severity with high impact on confidentiality and limited impact on integrity and availability. No public exploits are currently known, but the vulnerability poses a risk of sensitive data exposure and potential file system manipulation if exploited.

Potential Impact

For European organizations using Microweber CMS, this vulnerability could lead to unauthorized disclosure of sensitive internal files such as configuration files, credentials, or proprietary data. This could facilitate further attacks like privilege escalation or lateral movement within the network. The ability to relocate or delete files could also disrupt CMS operations or cause denial of service if critical files are affected. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased compliance risks and potential legal consequences if sensitive data is exposed. The medium severity rating indicates a significant but not critical threat, emphasizing the need for timely remediation to prevent exploitation. Since exploitation requires authenticated access, insider threats or compromised user accounts pose the greatest risk. The vulnerability could also be leveraged in targeted attacks against European entities using this CMS, especially where backup files or system configurations contain sensitive information.

Mitigation Recommendations

1. Immediately upgrade Microweber CMS to a version that patches this vulnerability once available. 2. Until a patch is released, restrict access to the backup management API endpoints (/api/BackupV2/upload and /api/BackupV2/download) to trusted administrators only, using network-level controls such as IP whitelisting or VPN access. 3. Implement strict input validation and sanitization on the 'src' parameter to prevent absolute path usage and enforce directory restrictions. 4. Review and harden file system permissions for the web service user to limit the scope of accessible files and prevent unauthorized file operations. 5. Monitor logs for unusual API usage patterns indicative of exploitation attempts, such as unexpected file paths or frequent backup API calls. 6. Conduct regular audits of user accounts and privileges to reduce the risk of compromised credentials being used to exploit this vulnerability. 7. Employ web application firewalls (WAF) with custom rules to detect and block path traversal attempts targeting the backup API endpoints. 8. Educate administrators and developers on secure coding practices related to file handling and path validation to prevent similar issues in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.550Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68658af26f40f0eb7293bb1f

Added to database: 7/2/2025, 7:39:30 PM

Last enriched: 11/29/2025, 4:34:47 PM

Last updated: 12/3/2025, 5:14:48 PM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats