We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
XBMC version 11, including builds up to the 2012-11-04 nightly release, contains a path traversal vulnerability in its embedded HTTP server. When accessed via HTTP Basic Authentication, the server fails to properly sanitize URI input, allowing authenticated users to request files outside the intended document root. An attacker can exploit this flaw to read arbitrary files from the host filesystem, including sensitive configuration or credential files.
Reserved 2025-08-05 | Published 2025-08-05 | Updated 2025-08-05 | Assigner VulnCheckCWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Lucas "acidgen" Lundgren
www.ioactive.com/.../uploads/pdfs/Security_Advisory_XBMC.pdf
raw.githubusercontent.com/...iliary/gather/xbmc_traversal.rb
github.com/...ommit/bdff099c024521941cb0956fe01d99ab52a65335
github.com/xbmc/xbmc
www.vulncheck.com/advisories/xbmc-web-server-path-traversal
Support options