CVE-2025-48940 (GCVE-0-2025-48940)
Vulnerability from cvelistv5
Published
2025-06-02 15:52
Modified
2025-06-02 16:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
MyBB is free and open source forum software. Prior to version 1.8.39, the upgrade component does not validate user input properly, which allows attackers to perform local file inclusion (LFI) via a specially crafted parameter value. In order to exploit the vulnerability, the installer must be unlocked (no `install/lock` file present) and the upgrade script must be accessible (by re-installing the forum via access to `install/index.php`; when the forum has not yet been installed; or the attacker is authenticated as a forum administrator). MyBB 1.8.39 resolves this issue.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-48940", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-02T16:05:49.846057Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-02T16:06:00.967Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "mybb", "vendor": "mybb", "versions": [ { "status": "affected", "version": "\u003c 1.8.39" } ] } ], "descriptions": [ { "lang": "en", "value": "MyBB is free and open source forum software. Prior to version 1.8.39, the upgrade component does not validate user input properly, which allows attackers to perform local file inclusion (LFI) via a specially crafted parameter value. In order to exploit the vulnerability, the installer must be unlocked (no `install/lock` file present) and the upgrade script must be accessible (by re-installing the forum via access to `install/index.php`; when the forum has not yet been installed; or the attacker is authenticated as a forum administrator). MyBB 1.8.39 resolves this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-02T15:52:36.740Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/mybb/mybb/security/advisories/GHSA-q4jv-xwjx-37cp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mybb/mybb/security/advisories/GHSA-q4jv-xwjx-37cp" }, { "name": "https://github.com/mybb/mybb/commit/6e6cfbd524d9101b51e1278ecf520479b64b0f00", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mybb/mybb/commit/6e6cfbd524d9101b51e1278ecf520479b64b0f00" }, { "name": "https://mybb.com/versions/1.8.39", "tags": [ "x_refsource_MISC" ], "url": "https://mybb.com/versions/1.8.39" } ], "source": { "advisory": "GHSA-q4jv-xwjx-37cp", "discovery": "UNKNOWN" }, "title": "MyBB\u0027s upgrade component vulnerable to local file inclusion" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-48940", "datePublished": "2025-06-02T15:52:36.740Z", "dateReserved": "2025-05-28T18:49:07.580Z", "dateUpdated": "2025-06-02T16:06:00.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-48940\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-06-02T16:15:30.063\",\"lastModified\":\"2025-07-02T15:18:47.520\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"MyBB is free and open source forum software. Prior to version 1.8.39, the upgrade component does not validate user input properly, which allows attackers to perform local file inclusion (LFI) via a specially crafted parameter value. In order to exploit the vulnerability, the installer must be unlocked (no `install/lock` file present) and the upgrade script must be accessible (by re-installing the forum via access to `install/index.php`; when the forum has not yet been installed; or the attacker is authenticated as a forum administrator). MyBB 1.8.39 resolves this issue.\"},{\"lang\":\"es\",\"value\":\"MyBB es un software de foro gratuito y de c\u00f3digo abierto. Antes de la versi\u00f3n 1.8.39, el componente de actualizaci\u00f3n no validaba correctamente la entrada del usuario, lo que permit\u00eda a los atacantes realizar la inclusi\u00f3n local de archivos (LFI) mediante un valor de par\u00e1metro especialmente manipulado. Para explotar esta vulnerabilidad, el instalador debe estar desbloqueado (sin el archivo `install/lock` presente) y el script de actualizaci\u00f3n debe ser accesible (reinstalando el foro mediante el acceso a `install/index.php`; cuando el foro a\u00fan no se haya instalado; o el atacante est\u00e9 autenticado como administrador del foro). MyBB 1.8.39 resuelve este problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.8.39\",\"matchCriteriaId\":\"C6445406-D542-43F3-97A5-BB4BDC20E2FA\"}]}]}],\"references\":[{\"url\":\"https://github.com/mybb/mybb/commit/6e6cfbd524d9101b51e1278ecf520479b64b0f00\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/mybb/mybb/security/advisories/GHSA-q4jv-xwjx-37cp\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://mybb.com/versions/1.8.39\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\",\"Release Notes\"]}]}}", "vulnrichment": { "containers": "{\"cna\": {\"title\": \"MyBB\u0027s upgrade component vulnerable to local file inclusion\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-22\", \"lang\": \"en\", \"description\": \"CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"version\": \"3.1\"}}], \"references\": [{\"name\": \"https://github.com/mybb/mybb/security/advisories/GHSA-q4jv-xwjx-37cp\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/mybb/mybb/security/advisories/GHSA-q4jv-xwjx-37cp\"}, {\"name\": \"https://github.com/mybb/mybb/commit/6e6cfbd524d9101b51e1278ecf520479b64b0f00\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/mybb/mybb/commit/6e6cfbd524d9101b51e1278ecf520479b64b0f00\"}, {\"name\": \"https://mybb.com/versions/1.8.39\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://mybb.com/versions/1.8.39\"}], \"affected\": [{\"vendor\": \"mybb\", \"product\": \"mybb\", \"versions\": [{\"version\": \"\u003c 1.8.39\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-06-02T15:52:36.740Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"MyBB is free and open source forum software. Prior to version 1.8.39, the upgrade component does not validate user input properly, which allows attackers to perform local file inclusion (LFI) via a specially crafted parameter value. In order to exploit the vulnerability, the installer must be unlocked (no `install/lock` file present) and the upgrade script must be accessible (by re-installing the forum via access to `install/index.php`; when the forum has not yet been installed; or the attacker is authenticated as a forum administrator). MyBB 1.8.39 resolves this issue.\"}], \"source\": {\"advisory\": \"GHSA-q4jv-xwjx-37cp\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-48940\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-02T16:05:49.846057Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-02T16:05:54.582Z\"}}]}", "cveMetadata": "{\"cveId\": \"CVE-2025-48940\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2025-05-28T18:49:07.580Z\", \"datePublished\": \"2025-06-02T15:52:36.740Z\", \"dateUpdated\": \"2025-06-02T16:06:00.967Z\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…