CVE-2025-1336

4.3 MEDIUM

📋 TL;DR

This path traversal vulnerability in CmsEasy 7.7.7.9 allows attackers to delete arbitrary files on the server by manipulating the imgname parameter in the deleteimg_action function. Attackers can exploit this remotely without authentication to delete critical system files. Only CmsEasy 7.7.7.9 installations are affected.

💻 Affected Systems

Products:
  • CmsEasy
Versions: 7.7.7.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the vulnerable image_admin.php file present and accessible via admin interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files like /etc/passwd, web.config, or application files leading to denial of service and potential privilege escalation.

🟠

Likely Case

Deletion of web application files causing website defacement, data loss, or denial of service for the CmsEasy application.

🟢

If Mitigated

Limited impact with proper file permission restrictions and web server sandboxing preventing access to critical system files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires admin access to reach the vulnerable endpoint. Public proof-of-concept available on GitHub.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider upgrading to newer CmsEasy version if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation Patch

all

Add path traversal validation to the deleteimg_action function in lib/admin/image_admin.php

Edit lib/admin/image_admin.php and add validation: if (strpos($imgname, '..') !== false || strpos($imgname, '/') !== false) { die('Invalid filename'); }

File Permission Restriction

linux

Restrict web server user permissions to prevent deletion of files outside web directory

chown -R root:root /var/www/html
chmod -R 755 /var/www/html
setfacl -R -m u:www-data:r-x /

🧯 If You Can't Patch

  • Restrict admin panel access to trusted IP addresses only using .htaccess or firewall rules.
  • Disable or remove the image_admin.php file if image management functionality is not required.

🔍 How to Verify

Check if Vulnerable:

Check if file lib/admin/image_admin.php exists and contains the deleteimg_action function without proper path validation.

Check Version:

Check CmsEasy version in admin panel or look for version.txt file in installation directory.

Verify Fix Applied:

Verify that path traversal attempts (using ../ in imgname parameter) are rejected with error messages.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /admin.php?case=image&act=deleteimg_action with ../ sequences in parameters
  • File deletion errors in web server logs for paths outside expected image directories

Network Indicators:

  • POST/GET requests containing path traversal sequences (.../) to admin endpoints

SIEM Query:

source="web_server" AND (uri="*deleteimg_action*" AND (param="*../*" OR param="*..\\*"))

🔗 References

📤 Share & Export