CVE-2025-30343

A directory traversal issue was discovered in OpenSlides before 4.2.5. Files can be uploaded to OpenSlides meetings and organized in folders. The interface allows users to download a ZIP archive that contains all files in a folder and its subfolders. If an attacker specifies the title of a file or folder as a relative or absolute path (e.g., ../../../etc/passwd), the ZIP archive generated for download converts that title into a path. Depending on the extraction tool used by the user, this might overwrite files locally outside of the chosen directory.
References
Link Resource
https://www.x41-dsec.de/lab/advisories/x41-2025-001-OpenSlides Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openslides:openslides:*:*:*:*:*:*:*:*

History

27 Mar 2025, 14:00

Type Values Removed Values Added
References () https://www.x41-dsec.de/lab/advisories/x41-2025-001-OpenSlides - () https://www.x41-dsec.de/lab/advisories/x41-2025-001-OpenSlides - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:openslides:openslides:*:*:*:*:*:*:*:*
CWE CWE-22
First Time Openslides
Openslides openslides

21 Mar 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-21 06:15

Updated : 2025-03-27 14:00


NVD link : CVE-2025-30343

Mitre link : CVE-2025-30343


JSON object : View

Products Affected

openslides

  • openslides
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')