CVE-2025-51661

Source
https://cve.org/CVERecord?id=CVE-2025-51661
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-51661.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-51661
Published
2025-11-19T20:15:52.867Z
Modified
2025-11-26T09:09:31.065163Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A path Traversal vulnerability found in FileCodeBox v2.2 and earlier allows arbitrary file writes when application is configured to use local filesystem storage. SystemFileStorage.savefile method in core/storage.py uses filenames from user input without validation to construct savepath and save files. This allows remote attackers to perform arbitrary file writes outside the intended directory by sending crafted POST requests with malicious traversal sequences to /share/file/ upload endpoint, which does not require any authorization.

References

Affected packages

Git / github.com/vastsa/filecodebox

Affected ranges

Type
GIT
Repo
https://github.com/vastsa/filecodebox
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

2.*
2.2
Other
Main
latest
V1.*
V1.1
V1.2
V1.4
V1.4.1
V1.4.3
V1.4.4
V1.4.5
V1.5.1
V1.5.2
V1.5.3
V1.5.4
V1.5.6
V1.5.7
V1.5.9
V1.5.9.1
V1.5.9.2
V1.6
V1.7Beta
V2.*
V2.0
V2.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-51661.json"