A path traversal vulnerability in RSFirewall component 2.9.7 - 3.1.5 for Joomla was discovered. This vulnerability allows authenticated users to read arbitrary files outside the Joomla root directory. The flaw is caused by insufficient sanitization of user-supplied input in file path parameters, allowing attackers to exploit directory traversal sequences (e.g., ../) to access sensitive files
                
            References
                    | Link | Resource | 
|---|---|
| https://rsjoomla.com/ | 
Configurations
                    No configuration.
History
                    17 Jun 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 5.4  | 
| Summary | 
        
        
  | 
05 Jun 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-06-05 14:15
Updated : 2025-06-17 20:15
NVD link : CVE-2025-27445
Mitre link : CVE-2025-27445
CVE.ORG link : CVE-2025-27445
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-35
                        
            Path Traversal: '.../...//'
