CVE-2025-5714
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-06

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in SoluçõesCoop iSoluçõesWEB up to 20250516. It has been classified as problematic. This affects an unknown part of the file /sys/up.upload.php of the component Profile Information Update. The manipulation of the argument nomeArquivo leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-06
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-06-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
isolucoesweb solucoescoop to 2025-05-16 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-5714 is a path traversal vulnerability in the SoluçõesCoop iSoluçõesWEB product, specifically in the Profile Information Update feature via the file /sys/up.upload.php. The vulnerability occurs because the input parameter 'nomeArquivo' (used for the profile picture filename) is not properly validated or sanitized. This allows an attacker to manipulate the filename to traverse directories outside the intended folder, potentially accessing unauthorized internal files or directories. The attack can be initiated remotely without authentication. [1, 2]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to access sensitive internal files or directories that should be restricted. This unauthorized file access can lead to information disclosure and may be leveraged for further exploitation. Since the attack is remotely exploitable without authentication and has an easy exploitability rating, it poses a moderate security risk. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of the vulnerable file /sys/up.upload.php and monitoring or testing the handling of the 'nomeArquivo' parameter for path traversal attempts. One suggested method is to use Google dorking with the query "inurl:sys/up.upload.php" to identify vulnerable targets. Additionally, you can test the parameter by sending crafted HTTP requests attempting directory traversal sequences (e.g., '../') in the 'nomeArquivo' parameter and observing if unauthorized files can be accessed. Network monitoring tools can be used to detect such suspicious requests. Specific commands might include curl or wget to send test requests, for example: curl -G "http://target/sys/up.upload.php" --data-urlencode "nomeArquivo=../../etc/passwd" to check if the server returns sensitive files. [2]


What immediate steps should I take to mitigate this vulnerability?

The immediate recommended mitigation is to upgrade the affected SoluçõesCoop iSoluçõesWEB software to a fixed version that addresses the vulnerability. Until an upgrade is possible, restrict access to the vulnerable endpoint /sys/up.upload.php, implement input validation and sanitization on the 'nomeArquivo' parameter to prevent path traversal, and monitor for suspicious activity targeting this parameter. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart