Description
EduSoho versions prior to 22.4.7 contain an arbitrary file read vulnerability in the classroom-course-statistics export functionality. A remote, unauthenticated attacker can supply crafted path traversal sequences in the fileNames[] parameter to read arbitrary files from the server filesystem, including application configuration files such as config/parameters.yml that may contain secrets and database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2026-01-19 (UTC).
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version before 22.4.7
References
www.edusoho.com/
github.com/edusoho/edusoho/releases/tag/v22.4.7
cn-sec.com/archives/2451582.html
blog.csdn.net/qq_41904294/article/details/135007351
github.com/...se-statistics存在任意文件读取漏洞.md
github.com/gobysec/GobyVuls/blob/master/CNVD-2023-03903.md
www.cnvd.org.cn/flaw/show/CNVD-2023-03903
www.vulncheck.com/...le-read-via-classroom-course-statistics