A vulnerability was found in Monitorr up to 1.7.6m. It has been classified as problematic. This affects an unknown part of the file assets/config/_installation/mkdbajax.php of the component Installer. The manipulation of the argument datadir leads to improper input validation. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
References
History
Fri, 04 Jul 2025 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in Monitorr up to 1.7.6m. It has been classified as problematic. This affects an unknown part of the file assets/config/_installation/mkdbajax.php of the component Installer. The manipulation of the argument datadir leads to improper input validation. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | Monitorr Installer mkdbajax.php input validation | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-07-04T11:02:06.164Z
Updated: 2025-07-04T11:02:06.164Z
Reserved: 2025-07-04T05:50:58.303Z
Link: CVE-2025-7060

No data.

Status : Received
Published: 2025-07-04T11:15:51.683
Modified: 2025-07-04T11:15:51.683
Link: CVE-2025-7060

No data.