We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-52562

Convey Panel Directory Traversal in LocaleController leading to Remote Code Execution



Description

Convoy is a KVM server management panel for hosting businesses. In versions 3.9.0-rc3 to before 4.4.1, there is a directory traversal vulnerability in the LocaleController component of Performave Convoy. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious locale and namespace parameters. This allows the attacker to include and execute arbitrary PHP files on the server. This issue has been patched in version 4.4.1. A temporary workaround involves implementing strict Web Application Firewall (WAF) rules to incoming requests targeting the vulnerable endpoints.

Reserved 2025-06-18 | Published 2025-06-23 | Updated 2025-06-23 | Assigner GitHub_M


CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

Product status

>= 3.9.0-rc.3, < 4.4.1
affected

References

github.com/.../panel/security/advisories/GHSA-43g3-qpwq-hfgg

github.com/...ommit/f8d6202f3e4912b65dbd9f80ba625576944ab36c

cve.org (CVE-2025-52562)

nvd.nist.gov (CVE-2025-52562)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-52562

Support options

Helpdesk Chat, Email, Knowledgebase