Home

Description

NavigaTUM is a website and API to search for rooms, buildings and other places. Prior to commit 86f34c7, there is a path traversal vulnerability in the propose_edits endpoint allows unauthenticated users to overwrite files in directories writable by the application user (e.g., /cdn). By supplying unsanitized file keys containing traversal sequences (e.g., ../../) in the JSON payload, an attacker can escape the intended temporary directory and replace public facing images or fill the server's storage. This issue has been patched via commit 86f34c7.

PUBLISHED Reserved 2026-02-03 | Published 2026-02-04 | Updated 2026-02-05 | Assigner GitHub_M




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-23: Relative Path Traversal

CWE-26: Path Traversal: '/dir/../filename'

Product status

< 86f34c72886a59ec8f1e6c00f78a5ab889a70fd0
affected

References

github.com/...igaTUM/security/advisories/GHSA-59hj-f48w-hjfm exploit

github.com/...igaTUM/security/advisories/GHSA-59hj-f48w-hjfm

github.com/TUM-Dev/NavigaTUM/pull/2650

github.com/...ommit/86f34c72886a59ec8f1e6c00f78a5ab889a70fd0

cve.org (CVE-2026-25575)

nvd.nist.gov (CVE-2026-25575)

Download JSON