CVE-2025-25997

7.5 HIGH

📋 TL;DR

CVE-2025-25997 is a directory traversal vulnerability in FeMiner wms v1.0 that allows remote attackers to access sensitive files outside the intended directory via the databak.php component. This affects all deployments of FeMiner wms version 1.0, potentially exposing configuration files, credentials, or other sensitive data.

💻 Affected Systems

Products:
  • FeMiner wms
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of FeMiner wms v1.0 are vulnerable by default when the databak.php component is accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through exposure of database credentials, configuration files with secrets, or other sensitive system files leading to data breach or further exploitation.

🟠

Likely Case

Unauthorized access to sensitive files containing configuration data, backup files, or user information that could facilitate additional attacks.

🟢

If Mitigated

Limited exposure of non-critical files if proper file permissions and web server configurations are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit via crafted HTTP requests to databak.php with directory traversal sequences.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://github.com/FeMiner/wms/issues/22

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Restrict access to databak.php

all

Block or restrict access to the vulnerable databak.php component using web server configuration.

# Apache: Add to .htaccess or virtual host config
<Files "databak.php">
    Order Deny,Allow
    Deny from all
</Files>
# Nginx: Add to server block
location ~ /databak\.php$ {
    deny all;
    return 403;
}

Implement input validation

all

Add input validation to databak.php to reject directory traversal sequences.

# Example PHP input validation
$filename = $_GET['file'];
if (strpos($filename, '..') !== false || strpos($filename, '/') !== false) {
    http_response_code(400);
    exit('Invalid file request');
}

🧯 If You Can't Patch

  • Implement network segmentation to isolate the vulnerable system from sensitive networks
  • Deploy a web application firewall (WAF) with rules to block directory traversal attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[target]/databak.php?file=../../../../etc/passwd (or similar traversal) and check if sensitive files are returned.

Check Version:

Check the software version in the web interface or configuration files, or examine the source code for version indicators.

Verify Fix Applied:

Test the same directory traversal attempts after implementing workarounds to confirm they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to databak.php containing '..' or '../' sequences
  • Unusual file access patterns from web server logs

Network Indicators:

  • HTTP requests with directory traversal patterns in URI parameters
  • Unusual outbound data transfers following databak.php access

SIEM Query:

source="web_server" AND uri="*databak.php*" AND (uri="*..*" OR uri="*../*")

🔗 References

📤 Share & Export