Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69055: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in SeaTheme BM Content Builder

0
Medium
VulnerabilityCVE-2025-69055cvecve-2025-69055cwe-22
Published: Thu Jan 22 2026 (01/22/2026, 16:52:21 UTC)
Source: CVE Database V5
Vendor/Project: SeaTheme
Product: BM Content Builder

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in SeaTheme BM Content Builder allows Path Traversal.This issue affects BM Content Builder: from n/a before 3.16.3.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 08:59:06 UTC

Technical Analysis

CVE-2025-69055 is a path traversal vulnerability classified under CWE-22 affecting SeaTheme BM Content Builder versions before 3.16.3.3. This vulnerability arises from improper limitation of pathname inputs, allowing an attacker to traverse directories outside the intended restricted directory. Specifically, an authenticated user with low privileges can craft malicious requests that manipulate file path parameters to access arbitrary files on the server filesystem. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 6.5, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. This means the attack can be performed remotely (AV:N) with low attack complexity (AC:L), requires low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality (C:H) but not integrity or availability. The primary risk is unauthorized disclosure of sensitive data stored on the server, which could include configuration files, credentials, or proprietary content. No public exploits have been reported yet, but the vulnerability's nature makes it a candidate for future exploitation. The vendor has released version 3.16.3.3 to address this issue, though no direct patch links are provided in the data. Organizations using affected versions should prioritize upgrading and review their input validation and access control mechanisms to prevent exploitation.

Potential Impact

For European organizations, the primary impact of CVE-2025-69055 is the potential exposure of sensitive information due to unauthorized file access. This can lead to data breaches involving intellectual property, customer data, or internal configuration files, undermining confidentiality. While the vulnerability does not affect system integrity or availability, the loss of confidentiality can have severe regulatory and reputational consequences, especially under GDPR requirements. Attackers exploiting this flaw could gain insights into system architecture or credentials, facilitating further attacks. Organizations in sectors such as finance, healthcare, and government, which often rely on content management systems like BM Content Builder, are particularly at risk. The ease of exploitation with low privileges and no user interaction increases the likelihood of targeted attacks or insider threats leveraging this vulnerability. Although no known exploits exist currently, the medium severity score and the nature of the vulnerability warrant immediate attention to prevent data leakage and comply with European data protection laws.

Mitigation Recommendations

1. Upgrade SeaTheme BM Content Builder to version 3.16.3.3 or later immediately to apply the official fix. 2. Implement strict input validation on all file path parameters to ensure they do not contain traversal sequences such as '../' or encoded equivalents. 3. Enforce least privilege principles for user accounts, limiting access to only necessary functions within the CMS. 4. Employ web application firewalls (WAF) with rules designed to detect and block path traversal attempts. 5. Conduct regular security audits and code reviews focusing on file handling and path resolution logic. 6. Monitor server logs for suspicious file access patterns indicative of traversal attempts. 7. Isolate the CMS environment and restrict filesystem permissions to minimize the impact of potential exploitation. 8. Educate administrators and developers about secure coding practices related to file system access. 9. Prepare incident response plans to quickly address any detected exploitation attempts. 10. Coordinate with SeaTheme support channels for updates and advisories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-29T11:18:59.801Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259234623b1157c7fb15b

Added to database: 1/22/2026, 5:06:43 PM

Last enriched: 2/18/2026, 8:59:06 AM

Last updated: 3/24/2026, 9:28:17 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses