Home

Description

qBit Manage is a tool that helps manage tedious tasks in qBittorrent and automate them. A path traversal vulnerability exists in qbit_manage's web API that allows authenticated users to read arbitrary files from the server filesystem through the restore_config_from_backup endpoint. The vulnerability allows attackers to bypass directory restrictions and read arbitrary files from the server filesystem by manipulating the backup_id parameter with path traversal sequences (e.g., ../). This vulnerability is fixed in 4.5.4.

PUBLISHED Reserved 2025-08-12 | Published 2025-08-19 | Updated 2025-08-19 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

>= 4.5.0, < 4.5.4
affected

References

github.com/...manage/security/advisories/GHSA-vh56-26wq-vvfv

github.com/StuffAnThings/qbit_manage/releases/tag/v4.5.4

cve.org (CVE-2025-55295)

nvd.nist.gov (CVE-2025-55295)

Download JSON