Opencast is a free, open-source platform to support the management of educational audio and video content. In version 18.0 and versions before 17.7, the protections against path traversal attacks in the UI config module are insufficient, still partially allowing for attacks in very specific cases. The path is checked without checking for the file separator. This could allow attackers access to files within another folder which starts with the same path. This issue has been fixed in versions 17.7 and 18.1. To mitigate this issue, check for folders that start with the same path as the ui-config folder.
References
Configurations
Configuration 1 (hide)
|
History
03 Sep 2025, 16:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/opencast/opencast/commit/e2cc65d6fbe052ebb71d9f6b583bb54b181af009 - Patch | |
References | () https://github.com/opencast/opencast/pull/6979 - Patch | |
References | () https://github.com/opencast/opencast/security/advisories/GHSA-hq8m-v68g-8cf8 - Third Party Advisory | |
First Time |
Apereo opencast
Apereo |
|
CPE | cpe:2.3:a:apereo:opencast:18.0:*:*:*:*:*:*:* cpe:2.3:a:apereo:opencast:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
29 Aug 2025, 16:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-29 16:15
Updated : 2025-09-03 16:09
NVD link : CVE-2025-55202
Mitre link : CVE-2025-55202
CVE.ORG link : CVE-2025-55202
JSON object : View
Products Affected
apereo
- opencast
CWE
CWE-23
Relative Path Traversal