CVE-2025-45145: n/a
Directory traversal in Follett Software's Destiny Library Manager 22_0_2_rc1 and fixed in v.22.5 AU1 allows remote attackers to read arbitrary system and application files via the image parameter
AI Analysis
Technical Summary
This vulnerability involves a directory traversal issue in Destiny Library Manager 22_0_2_rc1, where the image parameter can be exploited by remote attackers to access arbitrary files on the system. The vendor has addressed this issue in version 22.5 AU1. No further technical details or exploitation methods are provided in the available data.
Potential Impact
Successful exploitation could allow an attacker to read sensitive system and application files remotely, potentially exposing confidential information. There are no reports of active exploitation in the wild.
Mitigation Recommendations
Upgrade to Follett Software's Destiny Library Manager version 22.5 AU1 or later, where this vulnerability has been fixed. Since no official vendor advisory or patch link is provided, verify the update availability directly with Follett Software. Patch status is not yet confirmed via vendor advisory; check with the vendor for current remediation guidance.
CVE-2025-45145: n/a
Description
Directory traversal in Follett Software's Destiny Library Manager 22_0_2_rc1 and fixed in v.22.5 AU1 allows remote attackers to read arbitrary system and application files via the image parameter
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability involves a directory traversal issue in Destiny Library Manager 22_0_2_rc1, where the image parameter can be exploited by remote attackers to access arbitrary files on the system. The vendor has addressed this issue in version 22.5 AU1. No further technical details or exploitation methods are provided in the available data.
Potential Impact
Successful exploitation could allow an attacker to read sensitive system and application files remotely, potentially exposing confidential information. There are no reports of active exploitation in the wild.
Mitigation Recommendations
Upgrade to Follett Software's Destiny Library Manager version 22.5 AU1 or later, where this vulnerability has been fixed. Since no official vendor advisory or patch link is provided, verify the update availability directly with Follett Software. Patch status is not yet confirmed via vendor advisory; check with the vendor for current remediation guidance.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a10685ce1370fbb48076274
Added to database: 5/22/2026, 2:29:48 PM
Last enriched: 5/22/2026, 2:44:54 PM
Last updated: 5/23/2026, 8:02:14 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.