CVE-2025-51539
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-19

Last updated on: 2025-10-07

Assigner: MITRE

Description
EzGED3 3.5.0 contains an unauthenticated arbitrary file read vulnerability due to improper access control and insufficient input validation in a script exposed via the web interface. A remote attacker can supply a crafted path parameter to a PHP script to read arbitrary files from the filesystem. The script lacks both authentication checks and secure path handling, allowing directory traversal attacks (e.g., ../../../) to access sensitive files such as configuration files, database dumps, source code, and password reset tokens. If phpMyAdmin is exposed, extracted credentials can be used for direct administrative access. In environments without such tools, attacker-controlled file reads still allow full database extraction by targeting raw MySQL data files. The vendor states that the issue is fixed in 3.5.72.27183.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-19
Last Modified
2025-10-07
Generated
2026-05-07
AI Q&A
2025-08-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ezged ezged3 From 3.5.0 (inc) to 3.5.72.27183 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in EzGED3 3.5.0 allows an unauthenticated remote attacker to read arbitrary files on the server by exploiting improper access control and insufficient input validation in a PHP script exposed via the web interface. The attacker can use directory traversal techniques to access sensitive files such as configuration files, database dumps, source code, and password reset tokens without needing to log in.


How can this vulnerability impact me? :

The vulnerability can lead to exposure of sensitive information including configuration files, database contents, source code, and password reset tokens. If phpMyAdmin is exposed, attackers can extract credentials and gain direct administrative access. Even without such tools, attackers can extract full database contents by reading raw MySQL data files, potentially leading to data breaches and unauthorized system control.


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade EzGED3 to version 3.5.72.27183 or later, as the vendor has fixed the issue in that release. Additionally, restrict access to the vulnerable PHP script by implementing authentication and input validation controls, and avoid exposing phpMyAdmin or other database management tools publicly to reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart