We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in CTCMS Content Management System 2.1.2. It has been classified as critical. Affected is the function del of the file ctcms\apps\controllers\admin\Tpl.php of the component File Handler. The manipulation of the argument File leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Es wurde eine kritische Schwachstelle in CTCMS Content Management System 2.1.2 ausgemacht. Es geht dabei um die Funktion del der Datei ctcms\apps\controllers\admin\Tpl.php der Komponente File Handler. Mittels Manipulieren des Arguments File mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
2025-05-10: | Advisory disclosed |
2025-05-10: | VulDB entry created |
2025-05-10: | VulDB entry last update |
xiaoyang (VulDB User)
vuldb.com/?id.308292 (VDB-308292 | CTCMS Content Management System File Tpl.php del path traversal)
vuldb.com/?ctiid.308292 (VDB-308292 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.566498 (Submit #566498 | https://www.ctcms.cn/ CTCMS Content Management System V2.1.2 Arbitrary File Deletion)
github.com/...y_File_Deletion_Vulnerability_Authenticated.md
Support options