CVE-2026-25575

NavigaTUM is a website and API to search for rooms, buildings and other places. Prior to commit 86f34c7, there is a path traversal vulnerability in the propose_edits endpoint allows unauthenticated users to overwrite files in directories writable by the application user (e.g., /cdn). By supplying unsanitized file keys containing traversal sequences (e.g., ../../) in the JSON payload, an attacker can escape the intended temporary directory and replace public facing images or fill the server's storage. This issue has been patched via commit 86f34c7.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tum:navigatum:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-04 22:16

Updated : 2026-02-11 19:10


NVD link : CVE-2026-25575

Mitre link : CVE-2026-25575

CVE.ORG link : CVE-2026-25575


JSON object : View

Products Affected

tum

  • navigatum
CWE
CWE-23

Relative Path Traversal

CWE-26

Path Traversal: '/dir/../filename'

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')