First published: Tue Apr 01 2025(Updated: )
Path Traversal vulnerability in ONLYOFFICE Document Server before v8.0.1 allows a remote attacker to copy arbitrary files by manipulating the fileExt parameter in the /example/editor endpoint, leading to unauthorized access to sensitive files and potential Denial of Service (DoS).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ONLYOFFICE | <8.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46988 has a high severity rating as it allows remote attackers to exploit a directory traversal vulnerability.
To fix CVE-2023-46988, upgrade ONLYOFFICE Document Server to version 7.5.1 or later.
CVE-2023-46988 affects ONLYOFFICE Document Server versions 7.5.0 and earlier.
CVE-2023-46988 is classified as a directory traversal vulnerability.
By exploiting CVE-2023-46988, a remote attacker could obtain sensitive information from the affected system.