CVE-2025-15066

6.2 MEDIUM

📋 TL;DR

This vulnerability allows attackers to access files outside the intended directory through path traversal in Innorix WP. It affects all versions of Innorix WP when the 'exam' directory exists in the installation path. Attackers can potentially read sensitive files without proper authorization.

💻 Affected Systems

Products:
  • Innorix WP
Versions: All versions
Operating Systems: Any OS running Innorix WP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the 'exam' directory to exist under the Innorix WP installation directory (e.g., innorix/exam).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading sensitive configuration files, credentials, or system files leading to further exploitation.

🟠

Likely Case

Unauthorized reading of application files, configuration data, or user information stored in accessible directories.

🟢

If Mitigated

Limited file access restricted to non-sensitive directories if proper file permissions and web server restrictions are configured.

🌐 Internet-Facing: HIGH - Web applications exposed to the internet are directly accessible to attackers without network perimeter controls.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability to access sensitive files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically require minimal technical skill to exploit using common techniques like '../' sequences.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.gnit.co.kr/software/innorix_product.html

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates and apply workarounds immediately.

🔧 Temporary Workarounds

Remove exam directory

linux

Delete or rename the 'exam' directory from the Innorix WP installation path to prevent exploitation.

rm -rf /path/to/innorix/exam
mv /path/to/innorix/exam /path/to/innorix/exam.disabled

Web server path restriction

all

Configure web server to block access to parent directories using security modules or configuration.

# For Apache: Set 'AllowOverride None' in directory configuration
# For Nginx: Use 'deny all' in location blocks for sensitive paths

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block path traversal patterns
  • Restrict file permissions on sensitive directories and implement strict access controls

🔍 How to Verify

Check if Vulnerable:

Check if the 'exam' directory exists in your Innorix WP installation path and test for path traversal using tools like curl with '../' sequences.

Check Version:

Check Innorix WP documentation or configuration files for version information, as specific version commands are not documented.

Verify Fix Applied:

Verify the 'exam' directory no longer exists or is inaccessible, and test that path traversal attempts return appropriate error responses.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../', '..\', or similar path traversal patterns in URLs
  • Access attempts to files outside expected directories

Network Indicators:

  • Unusual file access patterns to sensitive paths
  • Multiple failed attempts to access restricted directories

SIEM Query:

web.url:*../* OR web.url:*..\\*

🔗 References

📤 Share & Export