A path traversal vulnerability in RSFirewall component 2.9.7 - 3.1.5 for Joomla was discovered. This vulnerability allows authenticated users to read arbitrary files outside the Joomla root directory. The flaw is caused by insufficient sanitization of user-supplied input in file path parameters, allowing attackers to exploit directory traversal sequences (e.g., ../) to access sensitive files
References
Link Providers
https://rsjoomla.com/ cve-icon cve-icon
History

Tue, 17 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Jun 2025 20:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Thu, 05 Jun 2025 13:30:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability in RSFirewall component 2.9.7 - 3.1.5 for Joomla was discovered. This vulnerability allows authenticated users to read arbitrary files outside the Joomla root directory. The flaw is caused by insufficient sanitization of user-supplied input in file path parameters, allowing attackers to exploit directory traversal sequences (e.g., ../) to access sensitive files
Title Extension - rsjoomla.com - A path traversal vulnerability RSFirewall component 2.9.7 - 3.1.5 for Joomla
Weaknesses CWE-35
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Joomla

Published: 2025-06-05T13:20:40.631Z

Updated: 2025-06-19T04:39:50.364Z

Reserved: 2025-02-25T21:22:02.367Z

Link: CVE-2025-27445

cve-icon Vulnrichment

Updated: 2025-06-17T19:41:16.392Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-05T14:15:31.413

Modified: 2025-06-17T20:15:31.250

Link: CVE-2025-27445

cve-icon Redhat

No data.