Home

Description

MiniGal Nano versions 0.3.5 and prior contain a path traversal vulnerability in index.php via the dir parameter. The application appends user-controlled input to the photos directory and attempts to prevent traversal by removing dot-dot sequences, but this protection can be bypassed using crafted directory patterns. An attacker can exploit this behavior to cause the application to enumerate and display image files from unintended filesystem locations that are readable by the web server, resulting in unintended information disclosure.

PUBLISHED Reserved 2026-02-06 | Published 2026-02-11 | Updated 2026-02-11 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version
affected

Credits

philopentest finder

References

web.archive.org/...3/http://www.minigal.dk/minigal-nano.html product

sourceforge.net/projects/minigalnano/ product

www.vulncheck.com/...l-nano-path-traversal-via-dir-parameter third-party-advisory

cve.org (CVE-2026-25869)

nvd.nist.gov (CVE-2026-25869)

Download JSON