A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
References
| Link | Resource |
|---|---|
| https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cnvd/2020/CNVD-2020-68596.yaml | Exploit |
| https://vulncheck.com/advisories/weiphp-path-traversal-file-read | Exploit Third Party Advisory |
| https://www.cnvd.org.cn/flaw/show/CNVD-2020-68596 | Third Party Advisory |
Configurations
History
20 Nov 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC. |
17 Nov 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-20 |
|
| Summary | (en) A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-07 UTC. |
17 Nov 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code. Exploitation evidence was observed by the Shadowserver Foundation on 2025-06-06 UTC. |
23 Sep 2025, 19:27
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Weiphp weiphp
Weiphp |
|
| CPE | cpe:2.3:a:weiphp:weiphp:5.0:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| Summary |
|
|
| References | () https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cnvd/2020/CNVD-2020-68596.yaml - Exploit | |
| References | () https://vulncheck.com/advisories/weiphp-path-traversal-file-read - Exploit, Third Party Advisory | |
| References | () https://www.cnvd.org.cn/flaw/show/CNVD-2020-68596 - Third Party Advisory |
26 Jun 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-26 16:15
Updated : 2025-11-20 21:16
NVD link : CVE-2025-34045
Mitre link : CVE-2025-34045
CVE.ORG link : CVE-2025-34045
JSON object : View
Products Affected
weiphp
- weiphp
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
