We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30343



Description

A directory traversal issue was discovered in OpenSlides before 4.2.5. Files can be uploaded to OpenSlides meetings and organized in folders. The interface allows users to download a ZIP archive that contains all files in a folder and its subfolders. If an attacker specifies the title of a file or folder as a relative or absolute path (e.g., ../../../etc/passwd), the ZIP archive generated for download converts that title into a path. Depending on the extraction tool used by the user, this might overwrite files locally outside of the chosen directory.

Reserved 2025-03-21 | Published 2025-03-21 | Updated 2025-03-21 | Assigner mitre


LOW: 3.0CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N

Problem types

CWE-24 Path Traversal: '../filedir'

Product status

Default status
unaffected

Any version before 4.2.5
affected

References

www.x41-dsec.de/lab/advisories/x41-2025-001-OpenSlides

cve.org (CVE-2025-30343)

nvd.nist.gov (CVE-2025-30343)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30343

Support options

Helpdesk Chat, Email, Knowledgebase