CVE-2025-51057
📋 TL;DR
This CVE describes a local file inclusion vulnerability in Vedo Suite version 2024.17 that allows authenticated remote attackers to read arbitrary files on the filesystem. The vulnerability exists in the '/api_vedo/video/preview' endpoint where an unsanitized 'readfile()' function call can be exploited.
💻 Affected Systems
- Vedo Suite
📦 What is this software?
Vedo Suite by Vedo Suite Project
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive system files, configuration files, password files, or other critical data, potentially leading to complete system compromise.
Likely Case
Authenticated attackers reading application configuration files, user data, or other sensitive information stored on the filesystem.
If Mitigated
With proper access controls and file system permissions, impact limited to files accessible by the web server process.
🎯 Exploit Status
Exploit code available on GitHub, requires authentication to exploit
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 2024.17
Vendor Advisory: http://bottinelli.com
Restart Required: No
Instructions:
1. Check current Vedo Suite version. 2. Upgrade to latest version from vendor. 3. Verify the fix by testing the vulnerable endpoint.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement proper input validation and sanitization for file path parameters in the vulnerable endpoint
Access Control Restriction
allRestrict access to the '/api_vedo/video/preview' endpoint to only necessary users
🧯 If You Can't Patch
- Implement web application firewall rules to block LFI patterns
- Restrict file system permissions for the web server process
🔍 How to Verify
Check if Vulnerable:
Test the '/api_vedo/video/preview' endpoint with path traversal payloads while authenticated
Check Version:
Check Vedo Suite version in application interface or configuration files
Verify Fix Applied:
Attempt to exploit the vulnerability after patching; successful patch should return error or deny access
📡 Detection & Monitoring
Log Indicators:
- Multiple requests to '/api_vedo/video/preview' with unusual file paths
- Patterns of '../' or directory traversal sequences in request logs
Network Indicators:
- Unusual file read patterns from web application
- Requests attempting to access sensitive file paths
SIEM Query:
source="web_logs" AND uri="/api_vedo/video/preview" AND (request CONTAINS "../" OR request CONTAINS "/etc/" OR request CONTAINS "/proc/")