CVE-2025-7575
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-14

Last updated on: 2025-07-15

Assigner: VulDB

Description
A vulnerability has been found in Zavy86 WikiDocs up to 1.0.77 and classified as critical. Affected by this vulnerability is the function image_drop_upload_ajax/image_delete_ajax of the file submit.php. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 1.0.78 is able to address this issue. The identifier of the patch is 98ea9ee4a2052c4327f89d2f7688cc1b5749450d. It is recommended to upgrade the affected component.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-14
Last Modified
2025-07-15
Generated
2026-05-07
AI Q&A
2025-07-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
zavy86 wikidocs 1.0.77
zavy86 wikidocs 1.0.78
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-7575 is a critical path traversal vulnerability in Zavy86 WikiDocs up to version 1.0.77, specifically in the image_drop_upload_ajax and image_delete_ajax functions of the submit.php file. The vulnerability arises because the application improperly handles user-supplied input used to construct file paths, allowing an authenticated attacker to manipulate the pathname and delete arbitrary files on the server by supplying path traversal payloads. This can be exploited remotely but requires administrator-level authentication. The issue was fixed in version 1.0.78 by sanitizing inputs and validating parameters to prevent directory traversal. [2, 3, 4]


How can this vulnerability impact me? :

This vulnerability can allow an authenticated attacker with administrator privileges to delete arbitrary files on the server by exploiting path traversal in the image deletion functionality. This can lead to denial of service by removing critical application files or source code, impacting the availability and integrity of the system. The attacker can remotely execute this attack without user interaction, potentially causing significant disruption to the affected WikiDocs installation. [2, 4]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if your Zavy86 WikiDocs installation is version 1.0.77 or earlier and if the submit.php file's functions image_drop_upload_ajax or image_delete_ajax are present without the patch. You can also look for suspicious POST requests to submit.php with parameters like image_name containing path traversal payloads (e.g., ../../filename). Additionally, Google dorking with queries such as inurl:submit.php can help identify vulnerable targets. On your system, monitoring web server logs for POST requests to submit.php with suspicious image_name values can help detect exploitation attempts. [2, 4]


What immediate steps should I take to mitigate this vulnerability?

The immediate recommended step is to upgrade Zavy86 WikiDocs to version 1.0.78, which includes a patch that sanitizes input parameters and prevents path traversal in the image_delete_ajax function. If upgrading immediately is not possible, you should restrict access to the submit.php endpoint to trusted administrators only, monitor and block suspicious POST requests containing path traversal patterns in image_name or document parameters, and ensure that only authenticated users with appropriate privileges can perform image deletion operations. [2, 3, 4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart