Vulnerability Description
A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Weiphp | Weiphp | 5.0 |
Related Weaknesses (CWE)
References
- https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cnvd/2020/CNExploit
- https://vulncheck.com/advisories/weiphp-path-traversal-file-readExploitThird Party Advisory
- https://www.cnvd.org.cn/flaw/show/CNVD-2020-68596Third Party Advisory
FAQ
What is CVE-2025-34045?
CVE-2025-34045 is a vulnerability with a CVSS score of 7.5 (HIGH). A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl para...
How severe is CVE-2025-34045?
CVE-2025-34045 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-34045?
Check the references section above for vendor advisories and patch information. Affected products include: Weiphp Weiphp.