CVE-2025-5714
BaseFortify
Publication date: 2025-06-06
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| isolucoesweb | solucoescoop | to 2025-05-16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-5714 is a path traversal vulnerability in the SoluçõesCoop iSoluçõesWEB product, specifically in the Profile Information Update feature via the file /sys/up.upload.php. The vulnerability occurs because the input parameter 'nomeArquivo' (used for the profile picture filename) is not properly validated or sanitized. This allows an attacker to manipulate the filename to traverse directories outside the intended folder, potentially accessing unauthorized internal files or directories. The attack can be initiated remotely without authentication. [1, 2]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker to access sensitive internal files or directories that should be restricted. This unauthorized file access can lead to information disclosure and may be leveraged for further exploitation. Since the attack is remotely exploitable without authentication and has an easy exploitability rating, it poses a moderate security risk. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of the vulnerable file /sys/up.upload.php and monitoring or testing the handling of the 'nomeArquivo' parameter for path traversal attempts. One suggested method is to use Google dorking with the query "inurl:sys/up.upload.php" to identify vulnerable targets. Additionally, you can test the parameter by sending crafted HTTP requests attempting directory traversal sequences (e.g., '../') in the 'nomeArquivo' parameter and observing if unauthorized files can be accessed. Network monitoring tools can be used to detect such suspicious requests. Specific commands might include curl or wget to send test requests, for example: curl -G "http://target/sys/up.upload.php" --data-urlencode "nomeArquivo=../../etc/passwd" to check if the server returns sensitive files. [2]
What immediate steps should I take to mitigate this vulnerability?
The immediate recommended mitigation is to upgrade the affected SoluçõesCoop iSoluçõesWEB software to a fixed version that addresses the vulnerability. Until an upgrade is possible, restrict access to the vulnerable endpoint /sys/up.upload.php, implement input validation and sanitization on the 'nomeArquivo' parameter to prevent path traversal, and monitor for suspicious activity targeting this parameter. [2]