Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m2j3-f8mq-gqq6

Опубликовано: 22 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 8.7

Описание

EduSoho versions prior to 22.4.7 contain an arbitrary file read vulnerability in the classroom-course-statistics export functionality. A remote, unauthenticated attacker can supply crafted path traversal sequences in the fileNames[] parameter to read arbitrary files from the server filesystem, including application configuration files such as config/parameters.yml that may contain secrets and database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2026-01-19 (UTC).

EduSoho versions prior to 22.4.7 contain an arbitrary file read vulnerability in the classroom-course-statistics export functionality. A remote, unauthenticated attacker can supply crafted path traversal sequences in the fileNames[] parameter to read arbitrary files from the server filesystem, including application configuration files such as config/parameters.yml that may contain secrets and database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2026-01-19 (UTC).

EPSS

Процентиль: 31%
0.00116
Низкий

8.7 High

CVSS4

Дефекты

CWE-22

Связанные уязвимости

nvd
17 дней назад

EduSoho versions prior to 22.4.7 contain an arbitrary file read vulnerability in the classroom-course-statistics export functionality. A remote, unauthenticated attacker can supply crafted path traversal sequences in the fileNames[] parameter to read arbitrary files from the server filesystem, including application configuration files such as config/parameters.yml that may contain secrets and database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2026-01-19 (UTC).

EPSS

Процентиль: 31%
0.00116
Низкий

8.7 High

CVSS4

Дефекты

CWE-22