Systemic Risk Value <=2.8.0 is vulnerable to Local File Inclusion via /GetFile.aspx?ReportUrl=. An unauthenticated attacker can exploit this issue to read arbitrary system files by supplying a crafted file path, potentially exposing sensitive information.
References
Link | Resource |
---|---|
https://github.com/Arakiba/CVEs/tree/main/CVE-2025-26137 | Third Party Advisory |
Configurations
History
01 Apr 2025, 20:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Arakiba/CVEs/tree/main/CVE-2025-26137 - Third Party Advisory | |
CPE | cpe:2.3:a:systemic-rm:risk_value:*:*:*:*:*:*:*:* | |
First Time |
Systemic-rm
Systemic-rm risk Value |
25 Mar 2025, 17:16
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-98 | |
Summary |
|
18 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-18 17:15
Updated : 2025-04-01 20:37
NVD link : CVE-2025-26137
Mitre link : CVE-2025-26137
CVE.ORG link : CVE-2025-26137
JSON object : View
Products Affected
systemic-rm
- risk_value
CWE
CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')