We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34045

WeiPHP Path Traversal Arbitrary File Read



Description

A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code.

Reserved 2025-04-15 | Published 2025-06-26 | Updated 2025-06-26 | Assigner VulnCheck


HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

CWE-20 Improper Input Validation

Product status

Default status
unaffected

5.0
affected

References

www.cnvd.org.cn/flaw/show/CNVD-2020-68596 third-party-advisory

github.com/.../blob/main/http/cnvd/2020/CNVD-2020-68596.yaml exploit

vulncheck.com/advisories/weiphp-path-traversal-file-read third-party-advisory

cve.org (CVE-2025-34045)

nvd.nist.gov (CVE-2025-34045)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34045

Support options

Helpdesk Chat, Email, Knowledgebase