phpTransformer 2016.9 contains a directory traversal vulnerability that allows unauthenticated attackers to access arbitrary files by manipulating the path parameter. Attackers can send requests to the jQueryFileUploadmaster server endpoint with traversal sequences ../../../../../../ to list and retrieve files outside the intended directory.
References
| Link | Resource |
|---|---|
| http://phptransformer.com/ | Product |
| https://netcologne.dl.sourceforge.net/project/phptransformer/Version%202016.9/release_2016.9.zip | Broken Link |
| https://www.exploit-db.com/exploits/46192 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/phptransformer-directory-traversal-via-jqueryfileupload | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-21 16:16
Updated : 2026-03-23 17:04
NVD link : CVE-2019-25579
Mitre link : CVE-2019-25579
CVE.ORG link : CVE-2019-25579
JSON object : View
Products Affected
codnloc
- phptransformer
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
