Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65346: n/a

0
Unknown
VulnerabilityCVE-2025-65346cvecve-2025-65346
Published: Thu Dec 04 2025 (12/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

alexusmai laravel-file-manager 3.3.1 and below is vulnerable to Directory Traversal. The unzip/extraction functionality improperly allows archive contents to be written to arbitrary locations on the filesystem due to insufficient validation of extraction paths.

AI-Powered Analysis

AILast updated: 12/04/2025, 15:31:35 UTC

Technical Analysis

The vulnerability identified as CVE-2025-65346 affects alexusmai laravel-file-manager versions 3.3.1 and below. This package is a Laravel-based file management tool commonly used in web applications to handle file uploads and management. The core issue is a directory traversal vulnerability in the unzip or archive extraction functionality. Specifically, the software fails to properly validate the paths of files extracted from archives, allowing an attacker to craft malicious archive files that, when extracted, write files outside the intended directory. This can lead to overwriting critical system or application files, potentially enabling remote code execution or persistent backdoors. The vulnerability does not require prior authentication, increasing its risk profile. Although no public exploits are currently known, the nature of the flaw makes it a significant threat once weaponized. The lack of a CVSS score indicates that the vulnerability is newly published and awaiting further assessment. The flaw affects any system using the vulnerable package version, particularly Laravel-based web applications that allow users to upload and extract archive files. Without proper path sanitization or sandboxing, attackers can leverage this to compromise server integrity.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to web application security and data integrity. Exploitation could allow attackers to overwrite critical files, inject malicious code, or establish persistent access, potentially leading to data breaches, service disruptions, or full system compromise. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened consequences including regulatory penalties and reputational damage. The vulnerability's ability to bypass authentication and write arbitrary files increases the attack surface, especially for public-facing applications. Additionally, the widespread use of Laravel in Europe means many organizations could be unknowingly exposed. The impact extends to availability if system files or application components are corrupted, potentially causing downtime. Given the potential for remote exploitation and the critical nature of file management in web applications, the threat is significant for European enterprises relying on vulnerable versions of this package.

Mitigation Recommendations

1. Immediately audit all Laravel-based applications to identify usage of alexusmai laravel-file-manager version 3.3.1 or earlier. 2. Apply patches or upgrade to a fixed version once released by the vendor. If no patch is available, consider disabling archive extraction functionality temporarily. 3. Implement strict validation and sanitization of file paths during archive extraction to prevent directory traversal, ensuring extracted files remain within intended directories. 4. Employ sandboxing techniques or containerization to isolate file extraction processes, limiting potential damage from exploitation. 5. Monitor application logs for unusual file extraction activities or attempts to write outside designated directories. 6. Restrict file upload permissions and enforce least privilege principles on directories used for file management. 7. Conduct penetration testing focused on file upload and extraction features to identify residual vulnerabilities. 8. Educate developers on secure handling of archive files and the risks of directory traversal attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6931a58504d931fa5b3e25d9

Added to database: 12/4/2025, 3:15:17 PM

Last enriched: 12/4/2025, 3:31:35 PM

Last updated: 12/5/2025, 5:31:39 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats