
We found results for “”
CVE-2025-55202
Good to know:


Date: August 29, 2025
Opencast is a free, open-source platform to support the management of educational audio and video content. In version 18.0 and versions before 17.7, the protections against path traversal attacks in the UI config module are insufficient, still partially allowing for attacks in very specific cases. The path is checked without checking for the file separator. This could allow attackers access to files within another folder which starts with the same path. This issue has been fixed in versions 17.7 and 18.1. To mitigate this issue, check for folders that start with the same path as the ui-config folder.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Relative Path Traversal
CWE-23Top Fix

Upgrade Version
Upgrade to version https://github.com/opencast/opencast.git - 17.7;https://github.com/opencast/opencast.git - 18.1
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | NONE |
Availability (A): | NONE |