Plattform
php
Komponente
innoshop
Behoben in
0.4.2
CVE-2025-52922 describes a directory traversal vulnerability discovered in InnoShop versions 0 through 0.4.1. This flaw allows authenticated attackers with access to the admin panel to traverse directories and potentially access sensitive files on the server. A fix is available in version 0.4.2, and users are strongly encouraged to upgrade immediately.
This Directory Traversal vulnerability grants an authenticated attacker extensive control over the InnoShop server's file system. By manipulating the basefolder parameter in the /api/filemanager/files endpoint, an attacker can enumerate the entire file system structure. Further exploitation allows the creation of arbitrary directories, the copying of files to readable locations, and the deletion of existing files. This could lead to the exposure of sensitive data, including configuration files, database credentials, and potentially even source code. The ability to delete files poses a significant risk of data loss and service disruption.
CVE-2025-52922 was publicly disclosed on 2025-06-23. No public proof-of-concept (PoC) code has been identified at the time of writing. The EPSS score is pending evaluation. It is not currently listed on the CISA KEV catalog.
Organizations using InnoShop for e-commerce or online store management are at risk, particularly those running versions 0 through 0.4.1. Shared hosting environments where multiple users share the same server instance are also at increased risk, as a compromised admin account on one store could potentially be used to exploit this vulnerability on other stores.
• php: Examine web server access logs for requests to /api/filemanager endpoints containing ../ sequences in the basefolder or other parameters.
grep 'api/file_manager.*\/\/\/' /var/log/apache2/access.log• php: Check for unusual file creations or deletions within the InnoShop application directory.
find /var/www/innoshop -type f -ctime -1• generic web: Monitor for unexpected file reads or modifications within the InnoShop application directory. • generic web: Review the application's configuration files for any insecure file paths or permissions.
disclosure
Exploit-Status
EPSS
0.30% (53% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-52922 is to upgrade InnoShop to version 0.4.2 or later, which contains the fix. If upgrading immediately is not feasible, consider implementing temporary workarounds. Restrict access to the FileManager API endpoints to only authorized administrators. Implement strict input validation on the base_folder parameter to prevent path traversal attempts. Consider using a Web Application Firewall (WAF) to filter requests containing suspicious path manipulation patterns. Monitor access logs for unusual file access patterns.
Actualice InnoShop a una versión posterior a 0.4.1 que corrija la vulnerabilidad de path traversal. Si no hay una versión disponible, considere deshabilitar o eliminar el componente FileManager hasta que se publique una solución. Revise y valide las configuraciones de seguridad del servidor web para mitigar el riesgo de acceso no autorizado al sistema de archivos.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-52922 is a HIGH severity vulnerability allowing authenticated admins in InnoShop versions 0-0.4.1 to traverse directories and access sensitive files.
You are affected if you are using InnoShop versions 0 through 0.4.1 and have not upgraded to version 0.4.2 or later.
Upgrade InnoShop to version 0.4.2 or later. As a temporary workaround, restrict access to the /api/file_manager endpoints and implement input validation.
Currently, there are no known public exploits or active campaigns targeting CVE-2025-52922, but the ease of exploitation warrants immediate attention.
Refer to the InnoShop project's official website or repository for the latest security advisories and updates.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.