HomeVvvebCVE-2025-12203

CVE-2025-12203

MEDIUM
5.3CVSS
Published: 2025-10-27
Updated: 2025-11-07
AI Analysis

Description

A weakness has been identified in givanz Vvveb up to 1.0.7.3. This issue affects the function sanitizeFileName of the file system/functions.php of the component Code Editor. Executing manipulation of the argument File can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. This patch is called b0fa7ff74a3539c6d37000db152caad572e4c39b. Applying a patch is advised to resolve this issue.

CVSS Metrics

Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Confidentiality
undefined
Integrity
undefined
Availability
undefined
Weaknesses
CWE-22

Metadata

Primary Vendor
VVVEB
Published
10/27/2025
Last Modified
11/7/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

vvveb : vvveb

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-12203 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com