First published: Mon Apr 21 2025(Updated: )
mojoPortal <=2.9.0.1 is vulnerable to Directory Traversal via BetterImageGallery API Controller - ImageHandler Action. An attacker can exploit this vulnerability to access the Web.Config file and obtain the MachineKey.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MojoPortal | <=2.9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-28367 is considered a high-severity vulnerability due to its potential to expose sensitive configuration files.
To mitigate CVE-2025-28367, update mojoPortal to version 2.9.0.2 or later to address the directory traversal issue.
Exploitation of CVE-2025-28367 could allow attackers to access sensitive files, such as the Web.Config file, compromising application security.
CVE-2025-28367 affects all versions of mojoPortal up to and including 2.9.0.1.
Yes, attackers can remotely exploit CVE-2025-28367 to gain unauthorized access to critical files on the server.