Skip to main content

CVE-2025-7575: Path Traversal in Zavy86 WikiDocs

Medium
VulnerabilityCVE-2025-7575cvecve-2025-7575
Published: Mon Jul 14 2025 (07/14/2025, 05:14:06 UTC)
Source: CVE Database V5
Vendor/Project: Zavy86
Product: WikiDocs

Description

A vulnerability has been found in Zavy86 WikiDocs up to 1.0.77 and classified as critical. Affected by this vulnerability is the function image_drop_upload_ajax/image_delete_ajax of the file submit.php. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 1.0.78 is able to address this issue. The identifier of the patch is 98ea9ee4a2052c4327f89d2f7688cc1b5749450d. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 07/14/2025, 05:31:25 UTC

Technical Analysis

CVE-2025-7575 is a path traversal vulnerability identified in Zavy86 WikiDocs versions 1.0.67 through 1.0.77. The vulnerability resides in the functions image_drop_upload_ajax and image_delete_ajax within the submit.php file. Path traversal vulnerabilities allow an attacker to manipulate file paths to access files and directories outside the intended scope, potentially exposing sensitive data or enabling unauthorized file operations. In this case, the vulnerability can be exploited remotely without user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:H). However, the attacker requires high privileges (PR:H), implying that some form of elevated access or credentials is necessary to exploit the flaw. The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L), suggesting that while exploitation can lead to unauthorized file access or deletion, the overall damage is somewhat constrained. The vendor has addressed this issue in version 1.0.78, with the patch identified by commit 98ea9ee4a2052c4327f89d2f7688cc1b5749450d. No known exploits are currently reported in the wild, but the critical nature of path traversal vulnerabilities warrants prompt attention. The vulnerability's medium CVSS score of 5.1 reflects the balance between ease of exploitation (no user interaction, network vector) and the requirement for high privileges, as well as the limited scope of impact. Organizations using affected versions of WikiDocs should prioritize upgrading to version 1.0.78 to mitigate this risk.

Potential Impact

For European organizations, the impact of CVE-2025-7575 depends largely on the deployment of Zavy86 WikiDocs within their IT environments. WikiDocs is typically used for collaborative documentation and knowledge management, often containing sensitive internal information. Exploitation of this path traversal vulnerability could allow an attacker with elevated privileges to access or delete files outside the intended directories, potentially exposing confidential documents or disrupting documentation services. This could lead to information leakage, operational disruption, and reputational damage. Given the remote exploitability, attackers could leverage this vulnerability as part of a broader attack chain, especially in environments where privilege escalation has already occurred. The medium severity suggests that while the threat is significant, it may not directly lead to full system compromise without additional vulnerabilities or misconfigurations. However, in regulated sectors common in Europe such as finance, healthcare, and government, any unauthorized data access or service disruption could have compliance and legal consequences under GDPR and other data protection regulations.

Mitigation Recommendations

1. Immediate upgrade of all affected WikiDocs instances to version 1.0.78 or later, which contains the official patch for this vulnerability. 2. Restrict access to WikiDocs administrative functions and ensure that only trusted, authenticated users have high privilege levels to reduce the risk of exploitation. 3. Implement strict input validation and sanitization on file path parameters to prevent path traversal attempts, even beyond the vendor patch. 4. Employ file system permissions and sandboxing to limit the scope of accessible directories and files for the WikiDocs application process. 5. Monitor logs for unusual file access patterns or deletion requests that could indicate exploitation attempts. 6. Conduct regular security audits and penetration tests focusing on web application vulnerabilities, including path traversal. 7. Use web application firewalls (WAFs) with rules designed to detect and block path traversal payloads targeting the affected endpoints. 8. Educate administrators and developers about secure coding practices and the importance of timely patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-13T07:28:03.828Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68749293a83201eaacc2106f

Added to database: 7/14/2025, 5:16:03 AM

Last enriched: 7/14/2025, 5:31:25 AM

Last updated: 7/16/2025, 8:58:56 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats