CVE-2025-44137

MapTiler Tileserver-php v2.0 is vulnerable to Directory Traversal. The renderTile function within tileserver.php is responsible for delivering tiles that are stored as files on the server via web request. Creating the path to a file allows the insertion of "../" and thus read any file on the web server. Affected GET parameters are "TileMatrix", "TileRow", "TileCol" and "Format"
Configurations

No configuration.

History

31 Jul 2025, 18:42

Type Values Removed Values Added
Summary
  • (es) MapTiler Tileserver-php v2.0 es vulnerable a Directory Traversal. La función renderTile de tileserver.php se encarga de entregar los mosaicos almacenados como archivos en el servidor mediante una solicitud web. Crear la ruta a un archivo permite insertar "../" y, por lo tanto, leer cualquier archivo en el servidor web. Los parámetros GET afectados son "TileMatrix", "TileRow", "TileCol" y "Format".

29 Jul 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.2
CWE CWE-22

29 Jul 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-29 17:15

Updated : 2025-07-31 18:42


NVD link : CVE-2025-44137

Mitre link : CVE-2025-44137

CVE.ORG link : CVE-2025-44137


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')