A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code.
Metrics
Affected Vendors & Products
References
History
Tue, 23 Sep 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Weiphp
Weiphp weiphp |
|
CPEs | cpe:2.3:a:weiphp:weiphp:5.0:*:*:*:*:*:*:* | |
Vendors & Products |
Weiphp
Weiphp weiphp |
|
Metrics |
cvssV3_1
|
Fri, 27 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 26 Jun 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code. | |
Title | WeiPHP Path Traversal Arbitrary File Read | |
Weaknesses | CWE-20 CWE-200 CWE-22 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-06-27T13:33:23.110Z
Reserved: 2025-04-15T19:15:22.547Z
Link: CVE-2025-34045

Updated: 2025-06-27T13:33:19.803Z

Status : Analyzed
Published: 2025-06-26T16:15:27.830
Modified: 2025-09-23T19:27:16.840
Link: CVE-2025-34045

No data.