CVE-2025-55202
Published:August 29, 2025
Updated:April 23, 2026
Opencast is a free, open-source platform to support the management of educational audio and video content. In version 18.0 and versions before 17.7, the protections against path traversal attacks in the UI config module are insufficient, still partially allowing for attacks in very specific cases. The path is checked without checking for the file separator. This could allow attackers access to files within another folder which starts with the same path. This issue has been fixed in versions 17.7 and 18.1. To mitigate this issue, check for folders that start with the same path as the ui-config folder.
Affected Packages
https://github.com/opencast/opencast.git (GITHUB):
Affected version(s) =18.0 <18.1Fix Suggestion:
Update to version 18.1https://github.com/opencast/opencast.git (GITHUB):
Affected version(s) >=1.3-rc1 <17.7Fix Suggestion:
Update to version 17.7Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
2.7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
Exploit Maturity
UNREPORTED
CVSS v3
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Relative Path Traversal
EPSS
Base Score:
0.07