CVE-2025-7575 – Zavy86 WikiDocs Remote Path Traversal Vulnerability

The following table lists the changes that have been made to the
CVE-2025-7575 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Jul. 14, 2025

    Action Type Old Value New Value
    Added Description A vulnerability has been found in Zavy86 WikiDocs up to 1.0.77 and classified as critical. Affected by this vulnerability is the function image_drop_upload_ajax/image_delete_ajax of the file submit.php. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 1.0.78 is able to address this issue. The identifier of the patch is 98ea9ee4a2052c4327f89d2f7688cc1b5749450d. It is recommended to upgrade the affected component.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V3.1 AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
    Added CVSS V2 (AV:N/AC:L/Au:M/C:P/I:P/A:P)
    Added CWE CWE-22
    Added Reference https://github.com/Zavy86/WikiDocs/commit/98ea9ee4a2052c4327f89d2f7688cc1b5749450d
    Added Reference https://github.com/Zavy86/WikiDocs/pull/258
    Added Reference https://github.com/Zavy86/WikiDocs/releases/tag/1.0.78
    Added Reference https://vuldb.com/?ctiid.316273
    Added Reference https://vuldb.com/?id.316273
    Added Reference https://vuldb.com/?submit.609096
Share the Post:

Related Posts