CVE-2025-15225
Unknown Unknown - Not Provided
Arbitrary File Read via Path Traversal in WMPro Allows Remote Access

Publication date: 2025-12-29

Last updated on: 2025-12-29

Assigner: TWCERT/CC

Description
WMPro developed by Sunnet has an Arbitrary File Read vulnerability, allowing unauthenticated remote attackers to exploit Relative Path Traversal to read arbitrary system files.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-29
Last Modified
2025-12-29
Generated
2026-05-07
AI Q&A
2025-12-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sunnet wmpro *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-23 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in WMPro developed by Sunnet is an Arbitrary File Read issue. It allows unauthenticated remote attackers to exploit Relative Path Traversal to read arbitrary system files on the affected system.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing attackers to read sensitive system files without authentication. This can lead to exposure of confidential information, potentially compromising system security and privacy.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated remote attackers to read arbitrary system files, compromising confidentiality. This exposure of sensitive data could lead to non-compliance with data protection regulations such as GDPR and HIPAA, which require safeguarding personal and sensitive information. Organizations using affected WMPro versions should apply patches and adjust configurations to mitigate this risk and maintain compliance. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

The recommended immediate steps to mitigate this vulnerability are to contact the vendor to install patches for WMPro versions 5.0 to 5.2 and adjust system configurations accordingly. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart