Description
SeedDMS 6.0.17 and 5.1.24 are vulnerable to Directory Traversal. The "Remove file" functionality inside the "Log files management" menu does not sanitize user input allowing attackers with admin privileges to delete arbitrary files on the remote system.
References (2)
Core 2
Core References
Patch, Vendor Advisory x_refsource_misc
https://sourceforge.net/p/seeddms/code/ci/d68c922152e8a8060dd7fc3ebdd7af685e270e36/
Exploit, Patch, Third Party Advisory x_refsource_misc
https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28478
Scores
CVSS v3
6.5
EPSS
0.0128
EPSS Percentile
79.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Details
CWE
CWE-22
Status
published
Products (2)
seeddms/seeddms
5.1.24
seeddms/seeddms
6.0.17
Published
Jun 06, 2022
Tracked Since
Feb 18, 2026