Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67004: n/a

0
Medium
VulnerabilityCVE-2025-67004cvecve-2025-67004
Published: Fri Jan 09 2026 (01/09/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

** Disputed ** An Information Disclosure vulnerability in CouchCMS 2.4 allow an Admin user to read arbitrary files via traversing directories back after back. It can Disclosure the source code or any other confidential information if weaponize accordingly. NOTE: A community member states that this is not a CouchCMS vulnerability and that if /\<file> is accessible it is a web-server configuration issue.

AI-Powered Analysis

AILast updated: 01/24/2026, 19:20:17 UTC

Technical Analysis

CVE-2025-67004 describes an information disclosure vulnerability affecting CouchCMS version 2.4. The issue involves an authenticated administrator being able to exploit directory traversal (CWE-22) to read arbitrary files on the web server by navigating back through directories beyond the intended scope. This can lead to exposure of sensitive files such as source code, configuration files, or other confidential data. The vulnerability is classified with a CVSS 3.1 base score of 6.5, reflecting medium severity, with attack vector being network-based, requiring low attack complexity and privileges of an admin user, and no user interaction. The scope remains unchanged, and the impact is high on confidentiality but none on integrity or availability. However, the vulnerability's existence is disputed by community feedback suggesting that if files are accessible via such traversal, it may be due to improper web server configuration rather than a flaw in CouchCMS itself. No patches or exploits have been reported, and the vulnerability was reserved in December 2025 and published in January 2026. The core technical risk lies in insufficient validation or sanitization of file path inputs allowing directory traversal by privileged users.

Potential Impact

For European organizations, the primary impact is the potential unauthorized disclosure of sensitive information such as source code, internal configuration files, or other confidential data if an attacker gains admin access and exploits this vulnerability. This could lead to intellectual property theft, exposure of credentials or secrets, and increased risk of further attacks leveraging disclosed information. While the vulnerability requires admin privileges, insider threats or compromised admin accounts could be leveraged. The impact on confidentiality is high, but there is no direct impact on system integrity or availability. Organizations relying on CouchCMS 2.4 or similar CMS platforms with comparable configurations are at risk. Given the dispute about the root cause, organizations with misconfigured web servers exposing files via traversal are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in targeted attacks.

Mitigation Recommendations

European organizations should first verify and harden their web server configurations to prevent unauthorized file access via directory traversal. This includes disabling access to sensitive directories and files, enforcing strict path validation, and ensuring that web server rules do not allow backtracking beyond intended directories. CouchCMS administrators should restrict admin access to trusted personnel and implement strong authentication and monitoring to detect suspicious activity. Regularly audit file permissions and server logs for anomalous access patterns. If possible, upgrade to newer versions of CouchCMS or apply vendor patches once available. Employ web application firewalls (WAFs) with rules to detect and block directory traversal attempts. Additionally, conduct penetration testing focused on directory traversal and file disclosure to identify and remediate any configuration weaknesses. Since the vulnerability requires admin privileges, protecting admin accounts with multi-factor authentication and limiting their exposure is critical.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696132fa6c9099d823e56070

Added to database: 1/9/2026, 4:55:22 PM

Last enriched: 1/24/2026, 7:20:17 PM

Last updated: 2/5/2026, 4:19:03 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats