Easyndexer 1.0 contains an arbitrary file download vulnerability that allows unauthenticated attackers to download sensitive files by manipulating the file parameter. Attackers can send POST requests to showtif.php with arbitrary file paths in the file parameter to retrieve system files like configuration and initialization files.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/45835 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/easyndexer-arbitrary-file-download-via-showtifphp | Broken Link |
Configurations
History
16 Mar 2026, 19:13
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:rul10:easyndexer:1.0:*:*:*:*:*:*:* | |
| First Time |
Rul10 easyndexer
Rul10 |
|
| Summary |
|
|
| References | () https://www.exploit-db.com/exploits/45835 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/easyndexer-arbitrary-file-download-via-showtifphp - Broken Link |
06 Mar 2026, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 13:15
Updated : 2026-03-16 19:13
NVD link : CVE-2018-25178
Mitre link : CVE-2018-25178
CVE.ORG link : CVE-2018-25178
JSON object : View
Products Affected
rul10
- easyndexer
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
