Home

Description

EduSoho versions prior to 22.4.7 contain an arbitrary file read vulnerability in the classroom-course-statistics export functionality. A remote, unauthenticated attacker can supply crafted path traversal sequences in the fileNames[] parameter to read arbitrary files from the server filesystem, including application configuration files such as config/parameters.yml that may contain secrets and database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2026-01-19 (UTC).

PUBLISHED Reserved 2026-01-21 | Published 2026-01-22 | Updated 2026-01-22 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version before 22.4.7
affected

References

www.edusoho.com/ product

github.com/edusoho/edusoho/releases/tag/v22.4.7 release-notes patch

cn-sec.com/archives/2451582.html technical-description exploit

blog.csdn.net/qq_41904294/article/details/135007351 technical-description exploit

github.com/...se-statistics存在任意文件读取漏洞.md exploit

github.com/gobysec/GobyVuls/blob/master/CNVD-2023-03903.md exploit

www.cnvd.org.cn/flaw/show/CNVD-2023-03903 government-resource vdb-entry

www.vulncheck.com/...le-read-via-classroom-course-statistics third-party-advisory

cve.org (CVE-2023-7335)

nvd.nist.gov (CVE-2023-7335)

Download JSON