Skip to main content

CVE-2025-48744: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in SIGB PMB

Medium
VulnerabilityCVE-2025-48744cvecve-2025-48744cwe-22
Published: Tue May 27 2025 (05/27/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: SIGB
Product: PMB

Description

In SIGB PMB before 8.0.1.2, attackers can achieve Local File Inclusion and remote code execution.

AI-Powered Analysis

AILast updated: 07/11/2025, 11:32:04 UTC

Technical Analysis

CVE-2025-48744 is a medium-severity vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This vulnerability affects SIGB's PMB product versions prior to 8.0.1.2. The flaw allows an attacker with local privileges (as indicated by the CVSS vector requiring PR:L) to manipulate file path inputs to access files outside the intended directory scope. This can lead to Local File Inclusion (LFI), where unauthorized files on the server can be read or included, potentially exposing sensitive information or configuration files. Furthermore, the vulnerability can be leveraged to achieve remote code execution (RCE), allowing an attacker to execute arbitrary code on the affected system remotely. The CVSS score of 6.4 reflects a medium severity level, with the attack vector being network-based (AV:N), low attack complexity (AC:L), no user interaction required (UI:N), and a scope change (S:C) indicating that the vulnerability affects resources beyond the initially vulnerable component. Confidentiality and integrity impacts are low, while availability is not affected. No known exploits are currently reported in the wild, and no patches have been linked yet, which suggests that organizations using SIGB PMB should prioritize monitoring and preparing for remediation once available. The vulnerability's exploitation requires some level of authenticated access, which somewhat limits the attack surface but does not eliminate risk, especially in environments where user credentials may be compromised or insider threats exist.

Potential Impact

For European organizations, the impact of CVE-2025-48744 can be significant, particularly for institutions relying on SIGB PMB for library management or document handling, such as universities, research centers, and public libraries. Exploitation could lead to unauthorized disclosure of sensitive documents or internal data, undermining confidentiality and potentially violating data protection regulations like GDPR. The possibility of remote code execution elevates the risk, as attackers could gain persistent access, manipulate data integrity, or use the compromised system as a foothold for lateral movement within the network. This could disrupt operations and damage organizational reputation. Given the medium severity and the requirement for some level of authentication, the threat is more pronounced in environments with weak access controls or insufficient monitoring. European organizations with stringent compliance requirements must consider this vulnerability a priority to avoid regulatory penalties and operational disruptions.

Mitigation Recommendations

To mitigate CVE-2025-48744 effectively, European organizations should implement the following specific measures: 1) Immediately audit and restrict access to SIGB PMB systems, ensuring that only authorized personnel have authenticated access, minimizing the risk of exploitation. 2) Employ strict input validation and sanitization on all file path parameters within the application to prevent path traversal attempts. 3) Monitor logs for unusual file access patterns or attempts to access files outside designated directories, enabling early detection of exploitation attempts. 4) Isolate SIGB PMB servers within segmented network zones with limited exposure to reduce the attack surface. 5) Prepare for patch deployment by establishing communication channels with SIGB vendors and subscribing to security advisories to apply updates promptly once patches are released. 6) Conduct regular security awareness training for users with access to SIGB PMB to recognize and report suspicious activities. 7) Implement application-layer firewalls or Web Application Firewalls (WAFs) with custom rules to detect and block path traversal payloads targeting the PMB product.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835ae14182aa0cae20f9f44

Added to database: 5/27/2025, 12:20:36 PM

Last enriched: 7/11/2025, 11:32:04 AM

Last updated: 7/30/2025, 4:10:09 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats