CVE-2025-67083
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-15

Last updated on: 2026-01-15

Assigner: MITRE

Description
Directory traversal vulnerability in InvoicePlane through 1.6.3 allows unauthenticated attackers to read files from the server. The ability to read files and the file type depends on the web server and its configuration.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-15
Last Modified
2026-01-15
Generated
2026-05-07
AI Q&A
2026-01-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
invoiceplane invoiceplane to 1.6.4 (exc)
invoiceplane invoiceplane 1.6.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a directory traversal flaw in InvoicePlane version 1.6.3 that allows unauthenticated attackers to read files from the server. The specific files that can be accessed depend on the web server and its configuration. Essentially, an attacker can manipulate file paths to access files outside the intended directories without needing to log in.


How can this vulnerability impact me? :

The impact of this vulnerability is that an attacker can read sensitive files on the server without authentication. This could lead to exposure of confidential information stored on the server, depending on which files are accessible due to the server's configuration. However, the vulnerability does not allow modification or deletion of data, only reading files.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the directory traversal vulnerability in InvoicePlane version 1.6.3, you should upgrade InvoicePlane to a version later than 1.6.3 where the vulnerability is fixed. Additionally, review and harden your web server configuration to restrict file access permissions and prevent unauthorized file reading. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart