CVE-2019-25579

HIGH

phpTransformer 2016.9 Directory Traversal via jQueryFileUpload

Title source: cna
STIX 2.1

Description

phpTransformer 2016.9 contains a directory traversal vulnerability that allows unauthenticated attackers to access arbitrary files by manipulating the path parameter. Attackers can send requests to the jQueryFileUploadmaster server endpoint with traversal sequences ../../../../../../ to list and retrieve files outside the intended directory.

Exploits (1)

exploitdb WORKING POC
by Ihsan Sencan · textwebappsphp
https://www.exploit-db.com/exploits/46192

References (4)

Core 4
Core References
Exploit exploit
ExploitDB-46192
https://www.exploit-db.com/exploits/46192
Product product
Official Product Homepage
http://phptransformer.com/
Third Party Advisory third-party-advisory
VulnCheck Advisory: phpTransformer 2016.9 Directory Traversal via jQueryFileUpload
https://www.vulncheck.com/advisories/phptransformer-directory-traversal-via-jqueryfileupload

Scores

CVSS v3 7.5
EPSS 0.0268
EPSS Percentile 85.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (2)
codnloc/phptransformer 2016.9
Phptransformer/phpTransformer 2016.9
Published Mar 21, 2026
Tracked Since Mar 21, 2026