CVE-2007-6215

Web-MeetMe 3.0.3 - Path Traversal via play.php roomNo Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-6215. PoCs published by Evil.Man.

AI-analyzed exploit summary This exploit demonstrates a directory traversal vulnerability in Web-MeetMe 3.0.3 via the 'roomNo' and 'bookid' parameters in play.php, allowing unauthorized file disclosure (e.g., /etc/passwd).

Description

Multiple directory traversal vulnerabilities in play.php in Web-MeetMe 3.0.3 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) roomNo and possibly the (2) bookid parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Evil.Man · textwebappsphp
https://www.exploit-db.com/exploits/4676

This exploit demonstrates a directory traversal vulnerability in Web-MeetMe 3.0.3 via the 'roomNo' and 'bookid' parameters in play.php, allowing unauthorized file disclosure (e.g., /etc/passwd).

Classification
Working Poc 100%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target: Web-MeetMe 3.0.3
No auth needed
Prerequisites: Access to the vulnerable play.php endpoint
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (3)

Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/38772
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/4676
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/26641

Scores

EPSS 0.0382
EPSS Percentile 88.3%

Details

CWE
CWE-22
Status published
Products (1)
web-meetme/web-meetme 3.0.3
Published Dec 04, 2007
Tracked Since Feb 18, 2026