Green CMS 2.x contains a path traversal vulnerability that allows authenticated attackers to download arbitrary files and directories by injecting directory traversal sequences. Attackers can manipulate the theme_name parameter in the themeexporthandle action or supply base64-encoded file paths to the downfile action to retrieve sensitive files outside intended directories.
References
| Link | Resource |
|---|---|
| http://www.greencms.net/ | Broken Link |
| https://codeload.github.com/GreenCMS/GreenCMS/zip/beta | Product |
| https://www.exploit-db.com/exploits/46245 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/green-cms-2-x-path-traversal-arbitrary-file-download | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-21 16:16
Updated : 2026-03-24 16:37
NVD link : CVE-2019-25574
Mitre link : CVE-2019-25574
CVE.ORG link : CVE-2019-25574
JSON object : View
Products Affected
njtech
- greencms
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
