Skip to main content

CVE-2025-47636: CWE-35 Path Traversal in Fernando Briano List category posts

High
VulnerabilityCVE-2025-47636cvecve-2025-47636cwe-35
Published: Wed May 07 2025 (05/07/2025, 14:20:40 UTC)
Source: CVE
Vendor/Project: Fernando Briano
Product: List category posts

Description

Path Traversal vulnerability in Fernando Briano List category posts list-category-posts allows PHP Local File Inclusion.This issue affects List category posts: from n/a through 0.91.0.

AI-Powered Analysis

AILast updated: 09/16/2025, 00:34:45 UTC

Technical Analysis

CVE-2025-47636 is a high-severity security vulnerability classified under CWE-35 (Path Traversal) affecting the 'List category posts' product developed by Fernando Briano. This vulnerability allows an attacker to perform PHP Local File Inclusion (LFI) via path traversal techniques. Essentially, the flaw exists because the application does not properly sanitize user-supplied input used to reference files, enabling an attacker to manipulate file paths and access arbitrary files on the server's filesystem. Exploiting this vulnerability could allow an attacker to read sensitive files, including configuration files, source code, or other data that should be inaccessible, potentially leading to disclosure of credentials or other secrets. Additionally, the attacker might execute arbitrary PHP code if they can include files containing malicious code, thereby compromising the confidentiality, integrity, and availability of the affected system. The vulnerability affects all versions of the 'List category posts' product up to and including version 0.91.0, with no patch currently available as per the provided information. The CVSS v3.1 base score is 7.5, indicating a high severity level, with the vector AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack can be launched remotely over the network but requires low privileges and high attack complexity, with no user interaction needed. The impact on confidentiality, integrity, and availability is high, reflecting the potential for significant damage if exploited. No known exploits are currently reported in the wild, but the vulnerability is published and recognized by authoritative sources such as CISA and Patchstack.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using the 'List category posts' product in their web infrastructure. The ability to perform local file inclusion can lead to unauthorized disclosure of sensitive data, including personal data protected under GDPR, configuration files containing credentials, or internal application logic. This could result in data breaches, regulatory penalties, reputational damage, and operational disruptions. Furthermore, if exploited to execute arbitrary code, attackers could gain persistent access to systems, deploy malware, or pivot to other internal resources. Organizations in sectors with high regulatory scrutiny such as finance, healthcare, and government are particularly vulnerable to the consequences of such breaches. The lack of a patch increases the urgency for mitigation. Since the attack requires low privileges but high attack complexity, targeted attacks by skilled adversaries are more likely than opportunistic mass exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as public disclosure may prompt attackers to develop exploits.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Conduct an immediate inventory to identify all instances of the 'List category posts' product in use, including version numbers. 2) Restrict access to vulnerable endpoints by implementing strict web application firewall (WAF) rules that detect and block path traversal patterns and suspicious file inclusion attempts. 3) Employ input validation and sanitization at the application or proxy level to prevent malicious path characters (e.g., '../') from reaching the vulnerable code. 4) Use least privilege principles for web server and application file permissions to limit the files accessible by the web application user, minimizing the impact of any file inclusion. 5) Monitor logs for unusual file access patterns or errors indicative of exploitation attempts. 6) If feasible, isolate the affected application in a segmented network zone to reduce lateral movement risk. 7) Engage with the vendor or community to obtain updates or patches as soon as they become available and plan for prompt deployment. 8) Consider temporary removal or disabling of the vulnerable functionality if it is not critical to operations until a patch is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T10:44:48.426Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8bc6

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 9/16/2025, 12:34:45 AM

Last updated: 9/22/2025, 12:07:58 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats