Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-824x-88xg-cwrv

Опубликовано: 05 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 8.3

Описание

Redaxo has Path Traversal in Backup Addon Leading to Arbitrary File Read

Summary

Authenticated users with backup permissions can read arbitrary files within the webroot via path traversal in the Backup addon's file export functionality. image image

Details

The Backup addon does not validate the EXPDIR POST parameter against the UI-generated allowlist of permitted directories.
An attacker can supply relative paths containing ../ sequences (or even absolute paths inside the document root) to include any readable file in the generated .tar.gz archive.

Vulnerable code:

  • redaxo/src/addons/backup/pages/export.php (lines 72-76) – directly uses $_POST['EXPDIR']
  • redaxo/src/addons/backup/lib/backup.php (lines ~413 & ~427) – concatenates unsanitized user input with base path

This allows disclosure of sensitive files such as:

  • redaxo/data/core/config.yml → database credentials + password hashes of all backend users
  • .env, custom configuration files, logs, uploaded malicious files, etc.

Affected versions

≤ 5.20.1 (confirmed working)

Patched versions

None (as of 2025-12-09)

PoC – Extracting database credentials and password hashes

  1. Log in as any user with Backup permission
  2. Go to Backup → Export → Files
image
  1. Intercept the request with Burp Suite
image
  1. Change one EXPDIR[] value to ../../../../var/www/html/redaxo/data/core
image
  1. Send request → download archive

    image
  2. Extract and open data/core/config.yml

    image

Result: plaintext database password image

Impact

Full compromise of the REDAXO installation:

  • Database takeover
  • Password hash extraction → offline cracking → admin access
  • When combined with other vulnerabilities → RCE

CVSS 4.0 vector & score below.

Credits

Discovered by: Łukasz Rybak

Пакеты

Наименование

redaxo/source

composer
Затронутые версииВерсия исправления

<= 5.20.1

5.20.2

EPSS

Процентиль: 19%
0.0006
Низкий

8.3 High

CVSS4

Дефекты

CWE-22
CWE-24

Связанные уязвимости

CVSS3: 6.5
nvd
около 1 месяца назад

REDAXO is a PHP-based content management system. Prior to version 5.20.2, authenticated users with backup permissions can read arbitrary files within the webroot via path traversal in the Backup addon's file export functionality. The Backup addon does not validate the `EXPDIR` POST parameter against the UI-generated allowlist of permitted directories. An attacker can supply relative paths containing `../` sequences (or even absolute paths inside the document root) to include any readable file in the generated `.tar.gz` archive. Version 5.20.2 fixes this issue.

EPSS

Процентиль: 19%
0.0006
Низкий

8.3 High

CVSS4

Дефекты

CWE-22
CWE-24