CVE-2025-50233

6.5 MEDIUM

📋 TL;DR

This vulnerability in QCMS 6.0.5 allows authenticated users to perform directory traversal attacks by manipulating the 'Name' parameter in the backend template editor. Attackers can read arbitrary files from the server, potentially exposing sensitive system files, configuration data, or PHP source code. Only systems running QCMS version 6.0.5 with authenticated user access are affected.

💻 Affected Systems

Products:
  • QCMS
Versions: 6.0.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to the backend template editor functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through exposure of configuration files containing database credentials, API keys, or other secrets that could lead to further attacks.

🟠

Likely Case

Exfiltration of sensitive configuration files, source code, or system information that could be used for reconnaissance or credential harvesting.

🟢

If Mitigated

Limited exposure of non-critical files if proper file permissions and web server configurations restrict access to sensitive directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of the vulnerable parameter. Directory traversal techniques are well-documented and relatively straightforward to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.6 or later

Vendor Advisory: https://github.com/xiaoyangsec/cve/blob/main/README.md

Restart Required: No

Instructions:

1. Backup your QCMS installation and database. 2. Download QCMS version 6.0.6 or later from the official repository. 3. Replace the vulnerable files with the patched version. 4. Verify the fix by testing the template editor functionality.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Add server-side validation to sanitize the 'Name' parameter and prevent directory traversal sequences.

Modify the template editor code to filter out '../', '..\', and other traversal patterns from the Name parameter

Access Restriction

all

Restrict access to the template editor functionality to only trusted administrators.

Implement additional authentication checks or IP whitelisting for the template editor interface

🧯 If You Can't Patch

  • Implement strict file permission controls to limit what files the web server user can read
  • Deploy a web application firewall (WAF) with rules to detect and block directory traversal attempts

🔍 How to Verify

Check if Vulnerable:

Test if authenticated users can access files outside the template directory by manipulating the Name parameter with traversal sequences like '../../etc/passwd'

Check Version:

Check the QCMS admin panel or version file for current version information

Verify Fix Applied:

Attempt the same directory traversal attack after patching; successful fix should return an error or sanitized output

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs
  • Multiple failed attempts to access files with traversal sequences in the Name parameter

Network Indicators:

  • HTTP requests containing directory traversal sequences in the Name parameter
  • Unusual file downloads from the template editor endpoint

SIEM Query:

web.url:*template* AND (web.param.name:*../* OR web.param.name:*..\*)

🔗 References

📤 Share & Export