First published: Fri Mar 21 2025(Updated: )
A directory traversal issue was discovered in OpenSlides before 4.2.5. Files can be uploaded to OpenSlides meetings and organized in folders. The interface allows users to download a ZIP archive that contains all files in a folder and its subfolders. If an attacker specifies the title of a file or folder as a relative or absolute path (e.g., ../../../etc/passwd), the ZIP archive generated for download converts that title into a path. Depending on the extraction tool used by the user, this might overwrite files locally outside of the chosen directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSlides | <4.2.5 | |
OpenSlides | <4.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30343 is classified as a high severity vulnerability.
To fix CVE-2025-30343, upgrade to OpenSlides version 4.2.5 or later.
CVE-2025-30343 is a directory traversal vulnerability.
CVE-2025-30343 affects OpenSlides versions prior to 4.2.5.
An attacker could potentially download arbitrary files from the server using CVE-2025-30343.