Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65345: n/a

0
Unknown
VulnerabilityCVE-2025-65345cvecve-2025-65345
Published: Wed Dec 03 2025 (12/03/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

alexusmai laravel-file-manager 3.3.1 and below is vulnerable to Directory Traversal. The zip/archiving functionality allows an attacker to create archives containing files and directories outside the intended scope due to improper path validation.

AI-Powered Analysis

AILast updated: 12/03/2025, 20:29:44 UTC

Technical Analysis

The vulnerability identified as CVE-2025-65345 affects the alexusmai laravel-file-manager package, specifically version 3.3.1 and earlier. This package is a Laravel-based file management tool commonly used in web applications to handle file uploads, downloads, and archiving. The vulnerability is a directory traversal issue within the zip or archiving functionality. Due to improper validation of file paths when creating archives, an attacker can craft archive files that include files or directories outside the intended directory scope. This means an attacker could potentially include arbitrary files from the server filesystem in the archive or cause files to be written outside the designated extraction directory when the archive is unpacked. Such behavior can lead to unauthorized disclosure of sensitive files, overwriting of critical system or application files, or even remote code execution if executable files are placed in sensitive locations. The vulnerability does not require authentication, increasing the risk if the file manager is exposed to untrusted users or the internet. No public exploits have been reported yet, but the nature of the flaw makes it a significant risk once weaponized. The lack of a CVSS score indicates the vulnerability is newly published, and no official severity rating is assigned. However, the technical details suggest a high severity due to the potential for significant confidentiality and integrity impacts and the relative ease of exploitation by attackers with access to the file upload or archive creation functionality.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, particularly for those relying on the alexusmai laravel-file-manager in their web applications. Exploitation could lead to unauthorized access to sensitive data, including personal information protected under GDPR, intellectual property, or configuration files containing credentials. Integrity of systems could be compromised by overwriting critical files, potentially leading to application malfunction or enabling further attacks such as remote code execution. Availability could also be impacted if system files are corrupted or deleted. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are especially vulnerable due to the sensitivity of their data and the regulatory implications of data breaches. The vulnerability’s exploitation does not require user interaction beyond the ability to upload or create archives, which increases the attack surface. Given the widespread use of Laravel in European web development, the threat could affect a broad range of organizations, from SMEs to large enterprises.

Mitigation Recommendations

Immediate mitigation should focus on restricting the ability to upload or create archives to trusted users only and implementing strict server-side validation of file paths within archives to ensure they do not traverse outside intended directories. Organizations should monitor for updates or patches from the alexusmai laravel-file-manager maintainers and apply them promptly once available. In the interim, consider disabling the zip/archiving functionality if feasible or isolating the file manager in a sandboxed environment with limited filesystem permissions to minimize potential damage. Employ web application firewalls (WAFs) to detect and block suspicious archive uploads or path traversal attempts. Regularly audit and monitor file system changes in directories managed by the file manager to detect unauthorized modifications. Additionally, educate developers and administrators about secure file handling practices and the risks of directory traversal vulnerabilities to prevent similar issues in custom code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69309a36728fb3f62ec00aca

Added to database: 12/3/2025, 8:14:46 PM

Last enriched: 12/3/2025, 8:29:44 PM

Last updated: 12/5/2025, 2:43:15 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats