A path traversal vulnerability in RSFirewall component 2.9.7 - 3.1.5 for Joomla was discovered. This vulnerability allows authenticated users to read arbitrary files outside the Joomla root directory. The flaw is caused by insufficient sanitization of user-supplied input in file path parameters, allowing attackers to exploit directory traversal sequences (e.g., ../) to access sensitive files
References
Link Providers
https://rsjoomla.com/ cve-icon cve-icon
History

Thu, 05 Jun 2025 13:30:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability in RSFirewall component 2.9.7 - 3.1.5 for Joomla was discovered. This vulnerability allows authenticated users to read arbitrary files outside the Joomla root directory. The flaw is caused by insufficient sanitization of user-supplied input in file path parameters, allowing attackers to exploit directory traversal sequences (e.g., ../) to access sensitive files
Title Extension - rsjoomla.com - A path traversal vulnerability RSFirewall component 2.9.7 - 3.1.5 for Joomla
Weaknesses CWE-35
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Joomla

Published: 2025-06-05T13:20:40.631Z

Updated: 2025-06-07T04:36:55.183Z

Reserved: 2025-02-25T21:22:02.367Z

Link: CVE-2025-27445

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-05T14:15:31.413

Modified: 2025-06-05T20:12:23.777

Link: CVE-2025-27445

cve-icon Redhat

No data.