CVE-2025-51661

A path Traversal vulnerability found in FileCodeBox v2.2 and earlier allows arbitrary file writes when application is configured to use local filesystem storage. SystemFileStorage.save_file method in core/storage.py uses filenames from user input without validation to construct save_path and save files. This allows remote attackers to perform arbitrary file writes outside the intended directory by sending crafted POST requests with malicious traversal sequences to /share/file/ upload endpoint, which does not require any authorization.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:lanol:filecodebox:*:*:*:*:*:*:*:*

History

24 Nov 2025, 19:35

Type Values Removed Values Added
CPE cpe:2.3:a:lanol:filecodebox:*:*:*:*:*:*:*:*
First Time Lanol filecodebox
Lanol
References () https://github.com/vastsa/FileCodeBox - () https://github.com/vastsa/FileCodeBox - Product
References () https://github.com/vastsa/FileCodeBox/issues/349 - () https://github.com/vastsa/FileCodeBox/issues/349 - Exploit, Issue Tracking

20 Nov 2025, 21:16

Type Values Removed Values Added
CWE CWE-24
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

19 Nov 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-19 20:15

Updated : 2025-11-24 19:35


NVD link : CVE-2025-51661

Mitre link : CVE-2025-51661

CVE.ORG link : CVE-2025-51661


JSON object : View

Products Affected

lanol

  • filecodebox
CWE
CWE-24

Path Traversal: '../filedir'