CVE-2025-7575

A vulnerability has been found in Zavy86 WikiDocs up to 1.0.77 and classified as critical. Affected by this vulnerability is the function image_drop_upload_ajax/image_delete_ajax of the file submit.php. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 1.0.78 is able to address this issue. The identifier of the patch is 98ea9ee4a2052c4327f89d2f7688cc1b5749450d. It is recommended to upgrade the affected component.
Configurations

No configuration.

History

14 Jul 2025, 14:15

Type Values Removed Values Added
References () https://vuldb.com/?submit.609096 - () https://vuldb.com/?submit.609096 -
Summary
  • (es) Se ha detectado una vulnerabilidad en Zavy86 WikiDocs hasta la versión 1.0.77, clasificada como crítica. Esta vulnerabilidad afecta a la función image_drop_upload_ajax/image_delete_ajax del archivo submit.php. La manipulación provoca un path traversal. El ataque puede ejecutarse en remoto. Actualizar a la versión 1.0.78 puede solucionar este problema. El identificador del parche es 98ea9ee4a2052c4327f89d2f7688cc1b5749450d. Se recomienda actualizar el componente afectado.

14 Jul 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-14 06:15

Updated : 2025-07-15 13:14


NVD link : CVE-2025-7575

Mitre link : CVE-2025-7575

CVE.ORG link : CVE-2025-7575


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')