CVE-2025-7575: Path Traversal in Zavy86 WikiDocs
A vulnerability has been found in Zavy86 WikiDocs up to 1.0.77 and classified as critical. Affected by this vulnerability is the function image_drop_upload_ajax/image_delete_ajax of the file submit.php. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 1.0.78 is able to address this issue. The identifier of the patch is 98ea9ee4a2052c4327f89d2f7688cc1b5749450d. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-7575 is a path traversal vulnerability identified in Zavy86 WikiDocs versions 1.0.67 through 1.0.77. The vulnerability resides in the functions image_drop_upload_ajax and image_delete_ajax within the submit.php file. Path traversal vulnerabilities allow an attacker to manipulate file paths to access files and directories outside the intended scope, potentially exposing sensitive data or enabling unauthorized file operations. In this case, the vulnerability can be exploited remotely without user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:H). However, the attacker requires high privileges (PR:H), implying that some form of elevated access or credentials is necessary to exploit the flaw. The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L), suggesting that while exploitation can lead to unauthorized file access or deletion, the overall damage is somewhat constrained. The vendor has addressed this issue in version 1.0.78, with the patch identified by commit 98ea9ee4a2052c4327f89d2f7688cc1b5749450d. No known exploits are currently reported in the wild, but the critical nature of path traversal vulnerabilities warrants prompt attention. The vulnerability's medium CVSS score of 5.1 reflects the balance between ease of exploitation (no user interaction, network vector) and the requirement for high privileges, as well as the limited scope of impact. Organizations using affected versions of WikiDocs should prioritize upgrading to version 1.0.78 to mitigate this risk.
Potential Impact
For European organizations, the impact of CVE-2025-7575 depends largely on the deployment of Zavy86 WikiDocs within their IT environments. WikiDocs is typically used for collaborative documentation and knowledge management, often containing sensitive internal information. Exploitation of this path traversal vulnerability could allow an attacker with elevated privileges to access or delete files outside the intended directories, potentially exposing confidential documents or disrupting documentation services. This could lead to information leakage, operational disruption, and reputational damage. Given the remote exploitability, attackers could leverage this vulnerability as part of a broader attack chain, especially in environments where privilege escalation has already occurred. The medium severity suggests that while the threat is significant, it may not directly lead to full system compromise without additional vulnerabilities or misconfigurations. However, in regulated sectors common in Europe such as finance, healthcare, and government, any unauthorized data access or service disruption could have compliance and legal consequences under GDPR and other data protection regulations.
Mitigation Recommendations
1. Immediate upgrade of all affected WikiDocs instances to version 1.0.78 or later, which contains the official patch for this vulnerability. 2. Restrict access to WikiDocs administrative functions and ensure that only trusted, authenticated users have high privilege levels to reduce the risk of exploitation. 3. Implement strict input validation and sanitization on file path parameters to prevent path traversal attempts, even beyond the vendor patch. 4. Employ file system permissions and sandboxing to limit the scope of accessible directories and files for the WikiDocs application process. 5. Monitor logs for unusual file access patterns or deletion requests that could indicate exploitation attempts. 6. Conduct regular security audits and penetration tests focusing on web application vulnerabilities, including path traversal. 7. Use web application firewalls (WAFs) with rules designed to detect and block path traversal payloads targeting the affected endpoints. 8. Educate administrators and developers about secure coding practices and the importance of timely patching.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-7575: Path Traversal in Zavy86 WikiDocs
Description
A vulnerability has been found in Zavy86 WikiDocs up to 1.0.77 and classified as critical. Affected by this vulnerability is the function image_drop_upload_ajax/image_delete_ajax of the file submit.php. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 1.0.78 is able to address this issue. The identifier of the patch is 98ea9ee4a2052c4327f89d2f7688cc1b5749450d. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-7575 is a path traversal vulnerability identified in Zavy86 WikiDocs versions 1.0.67 through 1.0.77. The vulnerability resides in the functions image_drop_upload_ajax and image_delete_ajax within the submit.php file. Path traversal vulnerabilities allow an attacker to manipulate file paths to access files and directories outside the intended scope, potentially exposing sensitive data or enabling unauthorized file operations. In this case, the vulnerability can be exploited remotely without user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:H). However, the attacker requires high privileges (PR:H), implying that some form of elevated access or credentials is necessary to exploit the flaw. The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L), suggesting that while exploitation can lead to unauthorized file access or deletion, the overall damage is somewhat constrained. The vendor has addressed this issue in version 1.0.78, with the patch identified by commit 98ea9ee4a2052c4327f89d2f7688cc1b5749450d. No known exploits are currently reported in the wild, but the critical nature of path traversal vulnerabilities warrants prompt attention. The vulnerability's medium CVSS score of 5.1 reflects the balance between ease of exploitation (no user interaction, network vector) and the requirement for high privileges, as well as the limited scope of impact. Organizations using affected versions of WikiDocs should prioritize upgrading to version 1.0.78 to mitigate this risk.
Potential Impact
For European organizations, the impact of CVE-2025-7575 depends largely on the deployment of Zavy86 WikiDocs within their IT environments. WikiDocs is typically used for collaborative documentation and knowledge management, often containing sensitive internal information. Exploitation of this path traversal vulnerability could allow an attacker with elevated privileges to access or delete files outside the intended directories, potentially exposing confidential documents or disrupting documentation services. This could lead to information leakage, operational disruption, and reputational damage. Given the remote exploitability, attackers could leverage this vulnerability as part of a broader attack chain, especially in environments where privilege escalation has already occurred. The medium severity suggests that while the threat is significant, it may not directly lead to full system compromise without additional vulnerabilities or misconfigurations. However, in regulated sectors common in Europe such as finance, healthcare, and government, any unauthorized data access or service disruption could have compliance and legal consequences under GDPR and other data protection regulations.
Mitigation Recommendations
1. Immediate upgrade of all affected WikiDocs instances to version 1.0.78 or later, which contains the official patch for this vulnerability. 2. Restrict access to WikiDocs administrative functions and ensure that only trusted, authenticated users have high privilege levels to reduce the risk of exploitation. 3. Implement strict input validation and sanitization on file path parameters to prevent path traversal attempts, even beyond the vendor patch. 4. Employ file system permissions and sandboxing to limit the scope of accessible directories and files for the WikiDocs application process. 5. Monitor logs for unusual file access patterns or deletion requests that could indicate exploitation attempts. 6. Conduct regular security audits and penetration tests focusing on web application vulnerabilities, including path traversal. 7. Use web application firewalls (WAFs) with rules designed to detect and block path traversal payloads targeting the affected endpoints. 8. Educate administrators and developers about secure coding practices and the importance of timely patching.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-13T07:28:03.828Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68749293a83201eaacc2106f
Added to database: 7/14/2025, 5:16:03 AM
Last enriched: 7/14/2025, 5:31:25 AM
Last updated: 7/16/2025, 8:58:56 AM
Views: 7
Related Threats
CVE-2025-53758: CWE-312: Cleartext Storage of Sensitive Information in Digisol XPON ONU Wi-Fi Router (DG-GR6821AC)
MediumCVE-2025-53757: CWE-614: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in Digisol XPON ONU Wi-Fi Router (DG-GR6821AC)
HighCVE-2025-52836: CWE-266 Incorrect Privilege Assignment in Unity Business Technology Pty Ltd The E-Commerce ERP
CriticalCVE-2025-52819: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pakkemx Pakke Envíos
HighCVE-2025-52804: CWE-862 Missing Authorization in uxper Nuss
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.