A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 26 Jun 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code. | |
Title | WeiPHP Path Traversal Arbitrary File Read | |
Weaknesses | CWE-20 CWE-200 CWE-22 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-06-26T15:51:37.884Z
Updated: 2025-06-27T13:33:23.110Z
Reserved: 2025-04-15T19:15:22.547Z
Link: CVE-2025-34045

Updated: 2025-06-27T13:33:19.803Z

Status : Awaiting Analysis
Published: 2025-06-26T16:15:27.830
Modified: 2025-06-26T18:57:43.670
Link: CVE-2025-34045

No data.