Listen to this Post
How the CVE Works
CVE-2025-28367 exploits a directory traversal vulnerability in mojoPortal versions <=2.9.0.1 via the BetterImageGallery API Controller’s ImageHandler action. An attacker manipulates file path inputs using `../` sequences to traverse directories and access sensitive files like Web.Config
. Successful exploitation allows retrieval of the MachineKey
, compromising encryption and authentication mechanisms. The flaw arises from insufficient input validation, enabling unauthorized file reads on the server.
DailyCVE Form
Platform: mojoPortal
Version: <=2.9.0.1
Vulnerability: Directory Traversal
Severity: Critical
Date: 06/23/2025
Prediction: Patch expected by 07/15/2025
What Undercode Say
Analytics
curl -X GET "http://target/api/BetterImageGallery/ImageHandler?file=../../Web.Config" grep -r "MachineKey" /var/www/mojoPortal/Web.Config
How Exploit
- Craft malicious path traversal request.
- Retrieve `Web.Config` via API.
- Extract `MachineKey` for further attacks.
Protection from this CVE
- Update to mojoPortal >2.9.0.1.
- Implement strict input validation.
- Restrict file access permissions.
Impact
- Unauthorized data exposure.
- Session hijacking.
- System compromise.
Sources:
Reported By: nvd.nist.gov
Extra Source Hub:
Undercode