CVE-2025-44137
HIGH EXPLOITED NUCLEIMaptiler Tileserver Php - Path Traversal
Title source: ruleDescription
MapTiler Tileserver-php v2.0 is vulnerable to Directory Traversal. The renderTile function within tileserver.php is responsible for delivering tiles that are stored as files on the server via web request. Creating the path to a file allows the insertion of "../" and thus read any file on the web server. Affected GET parameters are "TileMatrix", "TileRow", "TileCol" and "Format"
Exploits (1)
Nuclei Templates (1)
MapTiler Tileserver-php v2.0 - Unauthenticated File Read
HIGHVERIFIEDby 0x_Akoko
Shodan:
title:"TileServer-php"
FOFA:
title="TileServer-php"
Scores
CVSS v3
8.2
EPSS
0.0046
EPSS Percentile
64.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Details
VulnCheck KEV
2025-11-27
CWE
CWE-22
Status
published
Products (1)
maptiler/tileserver_php
2.0
Published
Jul 29, 2025
Tracked Since
Feb 18, 2026