We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An unauthenticated file download vulnerability exists in LimeSurvey versions from 2.0+ up to and including 2.06+ Build 151014. The application fails to validate serialized input to the admin backup endpoint (`index.php/admin/update/sa/backup`), allowing attackers to specify arbitrary file paths using a crafted `datasupdateinfo` payload. The files are packaged in a ZIP archive and made available for download without authentication. This vulnerability can be exploited to read arbitrary files on the host system, including sensitive OS and configuration files.
Reserved 2025-04-15 | Published 2025-07-16 | Updated 2025-07-16 | Assigner VulnCheckCWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-306 Missing Authentication for Critical Function
Pichaya Morimoto
web.archive.org/.../136-limesurvey-security-advisory-10-2015
sec-consult.com/...-critical-vulnerabilities-in-lime-survey/
raw.githubusercontent.com/...ttp/limesurvey_file_download.rb
packetstorm.news/files/id/180855
www.vulncheck.com/...unauthenticated-arbitrary-file-download
Support options