CVE-2025-10232

5.4 MEDIUM

📋 TL;DR

This CVE describes a path traversal vulnerability in 299ko CMS versions up to 2.0.0. Attackers can remotely exploit the getSentDir/delete function in FileManagerAPIController.php to access or delete files outside the intended directory. All users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • 299ko CMS
Versions: Up to and including 2.0.0
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the file manager plugin specifically; requires the plugin to be enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file deletion or sensitive file exfiltration, potentially leading to data loss, service disruption, or further exploitation.

🟠

Likely Case

Unauthorized file access or deletion within the web server context, potentially exposing configuration files, user data, or application source code.

🟢

If Mitigated

Limited impact with proper file permissions and web server sandboxing, restricting damage to non-critical files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available; attack requires remote access to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

Upgrade to a version above 2.0.0 if available; otherwise, apply manual code fixes or disable the vulnerable plugin.

🔧 Temporary Workarounds

Disable File Manager Plugin

all

Temporarily disable the vulnerable file manager plugin to prevent exploitation.

Navigate to plugin management in 299ko admin panel and disable the file manager plugin.

Implement Input Validation

all

Add path traversal checks to the getSentDir/delete function in FileManagerAPIController.php.

Edit plugin/filemanager/controllers/FileManagerAPIController.php to sanitize user input using realpath() or similar functions.

🧯 If You Can't Patch

  • Restrict network access to the 299ko instance using firewalls or network segmentation.
  • Implement strict file system permissions to limit the web server user's access to sensitive directories.

🔍 How to Verify

Check if Vulnerable:

Check 299ko version in admin panel or by examining the CMS files; versions ≤2.0.0 are vulnerable.

Check Version:

Check the version in the admin dashboard or look for version info in core files.

Verify Fix Applied:

Test the file manager functionality with path traversal payloads; successful blocking indicates fix.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs, especially requests to FileManagerAPIController.php with directory traversal sequences (../).

Network Indicators:

  • HTTP requests containing path traversal strings targeting the vulnerable endpoint.

SIEM Query:

Search web logs for 'FileManagerAPIController.php' AND ('../' OR '..\\' OR '%2e%2e%2f')

🔗 References

📤 Share & Export