Home

Description

Opencast is a free, open-source platform to support the management of educational audio and video content. In version 18.0 and versions before 17.7, the protections against path traversal attacks in the UI config module are insufficient, still partially allowing for attacks in very specific cases. The path is checked without checking for the file separator. This could allow attackers access to files within another folder which starts with the same path. This issue has been fixed in versions 17.7 and 18.1. To mitigate this issue, check for folders that start with the same path as the ui-config folder.

PUBLISHED Reserved 2025-08-08 | Published 2025-08-29 | Updated 2025-08-29 | Assigner GitHub_M




LOW: 2.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U

Problem types

CWE-23: Relative Path Traversal

Product status

< 17.7
affected

= 18.0
affected

References

github.com/...encast/security/advisories/GHSA-hq8m-v68g-8cf8

github.com/opencast/opencast/pull/6979

github.com/...ommit/e2cc65d6fbe052ebb71d9f6b583bb54b181af009

cve.org (CVE-2025-55202)

nvd.nist.gov (CVE-2025-55202)

Download JSON