CVE-2007-6215
Web-MeetMe 3.0.3 - Path Traversal via play.php roomNo Parameter
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2007-6215. PoCs published by Evil.Man.
AI-analyzed exploit summary This exploit demonstrates a directory traversal vulnerability in Web-MeetMe 3.0.3 via the 'roomNo' and 'bookid' parameters in play.php, allowing unauthorized file disclosure (e.g., /etc/passwd).
Description
Multiple directory traversal vulnerabilities in play.php in Web-MeetMe 3.0.3 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) roomNo and possibly the (2) bookid parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Evil.Man · textwebappsphp
https://www.exploit-db.com/exploits/4676
This exploit demonstrates a directory traversal vulnerability in Web-MeetMe 3.0.3 via the 'roomNo' and 'bookid' parameters in play.php, allowing unauthorized file disclosure (e.g., /etc/passwd).
Classification
Working Poc 100%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:
Web-MeetMe 3.0.3
No auth needed
Prerequisites:
Access to the vulnerable play.php endpoint
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/38772
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/4676
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/26641
Scores
EPSS
0.0382
EPSS Percentile
88.3%
Details
CWE
CWE-22
Status
published
Products (1)
web-meetme/web-meetme
3.0.3
Published
Dec 04, 2007
Tracked Since
Feb 18, 2026