CVE-2025-67083
BaseFortify
Publication date: 2026-01-15
Last updated on: 2026-01-15
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| invoiceplane | invoiceplane | to 1.6.4 (exc) |
| invoiceplane | invoiceplane | 1.6.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a directory traversal flaw in InvoicePlane version 1.6.3 that allows unauthenticated attackers to read files from the server. The specific files that can be accessed depend on the web server and its configuration. Essentially, an attacker can manipulate file paths to access files outside the intended directories without needing to log in.
How can this vulnerability impact me? :
The impact of this vulnerability is that an attacker can read sensitive files on the server without authentication. This could lead to exposure of confidential information stored on the server, depending on which files are accessible due to the server's configuration. However, the vulnerability does not allow modification or deletion of data, only reading files.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the directory traversal vulnerability in InvoicePlane version 1.6.3, you should upgrade InvoicePlane to a version later than 1.6.3 where the vulnerability is fixed. Additionally, review and harden your web server configuration to restrict file access permissions and prevent unauthorized file reading. [1]