Home

Description

Surreal ToDo 0.6.1.2 contains a local file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the content parameter. Attackers can supply directory traversal sequences through the content parameter in index.php to access sensitive system files like configuration and initialization files.

PUBLISHED Reserved 2026-03-06 | Published 2026-03-06 | Updated 2026-03-06 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

0.6.1.2
affected

Credits

Ihsan Sencan finder

References

www.exploit-db.com/exploits/45826 (ExploitDB-45826) exploit

www.vulncheck.com/...-todo-local-file-inclusion-via-indexphp (VulnCheck Advisory: Surreal ToDo 0.6.1.2 Local File Inclusion via index.php) third-party-advisory

cve.org (CVE-2018-25184)

nvd.nist.gov (CVE-2018-25184)

Download JSON