An unauthenticated file download vulnerability exists in LimeSurvey versions from 2.0+ up to and including 2.06+ Build 151014. The application fails to validate serialized input to the admin backup endpoint (`index.php/admin/update/sa/backup`), allowing attackers to specify arbitrary file paths using a crafted `datasupdateinfo` payload. The files are packaged in a ZIP archive and made available for download without authentication. This vulnerability can be exploited to read arbitrary files on the host system, including sensitive OS and configuration files.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthenticated file download vulnerability exists in LimeSurvey versions from 2.0+ up to and including 2.06+ Build 151014. The application fails to validate serialized input to the admin backup endpoint (`index.php/admin/update/sa/backup`), allowing attackers to specify arbitrary file paths using a crafted `datasupdateinfo` payload. The files are packaged in a ZIP archive and made available for download without authentication. This vulnerability can be exploited to read arbitrary files on the host system, including sensitive OS and configuration files. | |
Title | LimeSurvey 2.0+ - 2.06+ Unauthenticated Arbitrary File Download via Serialized Backup Payload | |
Weaknesses | CWE-22 CWE-306 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-16T21:05:34.816Z
Updated: 2025-07-17T19:58:52.455Z
Reserved: 2025-04-15T19:15:22.561Z
Link: CVE-2025-34120

Updated: 2025-07-17T19:58:48.318Z

Status : Awaiting Analysis
Published: 2025-07-16T21:15:26.960
Modified: 2025-07-17T21:15:50.197
Link: CVE-2025-34120

No data.