Skip to main content

CVE-2025-48940: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in mybb mybb

High
VulnerabilityCVE-2025-48940cvecve-2025-48940cwe-22
Published: Mon Jun 02 2025 (06/02/2025, 15:52:36 UTC)
Source: CVE Database V5
Vendor/Project: mybb
Product: mybb

Description

MyBB is free and open source forum software. Prior to version 1.8.39, the upgrade component does not validate user input properly, which allows attackers to perform local file inclusion (LFI) via a specially crafted parameter value. In order to exploit the vulnerability, the installer must be unlocked (no `install/lock` file present) and the upgrade script must be accessible (by re-installing the forum via access to `install/index.php`; when the forum has not yet been installed; or the attacker is authenticated as a forum administrator). MyBB 1.8.39 resolves this issue.

AI-Powered Analysis

AILast updated: 07/03/2025, 16:40:54 UTC

Technical Analysis

CVE-2025-48940 is a high-severity vulnerability affecting MyBB, a widely used free and open-source forum software. The vulnerability is classified as CWE-22: Improper Limitation of a Pathname to a Restricted Directory, commonly known as a path traversal flaw. Specifically, in versions of MyBB prior to 1.8.39, the upgrade component fails to properly validate user input parameters. This flaw allows an attacker to perform Local File Inclusion (LFI) by manipulating a parameter value in the upgrade script. Exploiting this vulnerability requires that the installer be unlocked, meaning the 'install/lock' file is absent, and the upgrade script remains accessible. This condition can occur if the forum has not yet been installed, if the attacker can reinstall the forum via 'install/index.php', or if the attacker is authenticated as a forum administrator. Successful exploitation can lead to unauthorized reading of sensitive files on the server, potentially exposing configuration files, credentials, or other critical data. The vulnerability has a CVSS 3.1 base score of 7.2, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring high privileges but no user interaction. The issue was addressed in MyBB version 1.8.39, which includes proper input validation to prevent path traversal attacks in the upgrade component.

Potential Impact

For European organizations using MyBB forum software, this vulnerability poses significant risks. If exploited, attackers could gain access to sensitive internal files, including configuration files containing database credentials or other secrets, leading to data breaches or further system compromise. The requirement for either the installer to be unlocked or administrative authentication limits the attack surface but does not eliminate risk, especially in environments where installation procedures are not properly finalized or where administrator credentials are compromised or weak. The potential impact includes unauthorized disclosure of confidential information, modification or deletion of files affecting forum integrity, and possible denial of service if critical files are manipulated. Given that many European organizations rely on forums for community engagement, customer support, or internal communication, exploitation could disrupt operations and damage reputation. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within affected networks.

Mitigation Recommendations

European organizations should immediately upgrade all MyBB installations to version 1.8.39 or later to remediate this vulnerability. Beyond patching, organizations must ensure that the installation process is properly completed and that the 'install/lock' file is present to prevent unauthorized access to installation or upgrade scripts. Access controls should be tightened to restrict access to the 'install' directory and upgrade scripts, ideally limiting it to trusted administrators only. Regular audits should verify that no installation or upgrade scripts remain accessible on production systems. Additionally, strong authentication mechanisms for forum administrators should be enforced, including multi-factor authentication where possible, to reduce the risk of credential compromise. Monitoring and logging access to installation and upgrade components can help detect attempted exploitation. Finally, organizations should conduct security reviews of their web applications to identify and remediate similar path traversal or file inclusion vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-28T18:49:07.580Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dca2c182aa0cae24b06a5

Added to database: 6/2/2025, 3:58:36 PM

Last enriched: 7/3/2025, 4:40:54 PM

Last updated: 7/6/2025, 9:50:31 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats