CVE-2025-44137

HIGH EXPLOITED NUCLEI

Maptiler Tileserver Php - Path Traversal

Title source: rule

Description

MapTiler Tileserver-php v2.0 is vulnerable to Directory Traversal. The renderTile function within tileserver.php is responsible for delivering tiles that are stored as files on the server via web request. Creating the path to a file allows the insertion of "../" and thus read any file on the web server. Affected GET parameters are "TileMatrix", "TileRow", "TileCol" and "Format"

Exploits (1)

nomisec WORKING POC
by mheranco · infoleak
https://github.com/mheranco/CVE-2025-44137

Nuclei Templates (1)

MapTiler Tileserver-php v2.0 - Unauthenticated File Read
HIGHVERIFIEDby 0x_Akoko
Shodan: title:"TileServer-php"
FOFA: title="TileServer-php"

Scores

CVSS v3 8.2
EPSS 0.0046
EPSS Percentile 64.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

Details

VulnCheck KEV 2025-11-27
CWE
CWE-22
Status published
Products (1)
maptiler/tileserver_php 2.0
Published Jul 29, 2025
Tracked Since Feb 18, 2026