Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-35 (路径遍历:’…/…//’) — Vulnerability Class 149

149 vulnerabilities classified as CWE-35 (路径遍历:’…/…//’). AI Chinese analysis included.

CWE-35 represents a critical path traversal vulnerability where software fails to properly sanitize input containing the specific sequence ‘.../...//’. This weakness allows attackers to bypass directory restrictions by exploiting how certain operating systems or application frameworks resolve these unusual path segments. By injecting this sequence into user-controlled input, an adversary can manipulate file system navigation to access sensitive files located outside the intended restricted directory, potentially leading to unauthorized data disclosure or system compromise. Developers mitigate this risk by implementing rigorous input validation that strictly rejects or neutralizes all path traversal characters, including this specific triple-dot variant. Additionally, using canonicalization functions to resolve paths before comparison and enforcing strict allow-lists for permitted file extensions ensures that external input cannot redirect execution to unintended system locations.

MITRE CWE Description
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Common Consequences (1)
Confidentiality, IntegrityRead Files or Directories, Modify Files or Directories, Bypass Protection Mechanism
Not properly neutralizing '.../...//' (doubled triple dot slash) allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Mitigations (2)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Effectiveness: High
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
Examples (1)
Suppose the product serves files from a specific "public" directory -- /home/product/public/ -- and has an algorithm that attempts to protect against common path traversal attacks. The algorithm works by sequentially scanning through a requested filename and removes each occurrence of "../" that it encounters, then appending the filename to the public directory.
../secret.dat
Attack
/home/product/public/secret.dat
Result
CVE IDTitleCVSSSeverityPublished
CVE-2025-20313 Cisco IOS XE 安全漏洞 — Cisco IOS XE Software 6.7 Medium2025-09-24
CVE-2025-43886 Dell PowerProtect Data Manager 安全漏洞 — PowerProtect Data Manager 4.4 Medium2025-09-10
CVE-2025-48317 WordPress WooCommerce Payment Gateway for Saferpay Plugin <= 0.4.9 - Path Traversal Vulnerability — WooCommerce Payment Gateway for Saferpay 7.5 High2025-09-05
CVE-2025-4956 WordPress Pro Bulk Watermark Plugin for WordPress Theme <= 2.0 - Path Traversal Vulnerability — Pro Bulk Watermark Plugin for WordPress 4.3 Medium2025-08-30
CVE-2025-48081 WordPress Printeers Print & Ship plugin <= 1.17.0 - Directory Traversal vulnerability — Printeers Print & Ship 5.3 Medium2025-08-27
CVE-2025-53561 WordPress Prevent files / folders access Plugin <= 2.6.0 - Path Traversal Vulnerability — Prevent files / folders access 6.5 Medium2025-08-20
CVE-2025-52712 WordPress Post and Page Builder by BoldGrid – Visual Drag and Drop Editor <= 1.27.8 - Path Traversal Vulnerability — Post and Page Builder by BoldGrid 4.2 Medium2025-08-14
CVE-2025-8088 Path traversal vulnerability in WinRAR — WinRAR 8.4 -2025-08-08
CVE-2024-52885 Path Traversal — Check Point Mobile Access 5.0 Medium2025-08-06
CVE-2025-53417 File Parsing Deserialization of Untrusted Data in DTM Soft — DIAView 7.5AIHighAI2025-08-05
CVE-2025-20320 Denial of Service (DoS) through “User Interface - Views“ configuration page in Splunk Enterprise — Splunk Enterprise 6.3 Medium2025-07-07
CVE-2025-52805 WordPress Leyka plugin <= 3.32.1 - Local File Inclusion vulnerability — Leyka 7.5 High2025-07-04
CVE-2025-52810 WordPress Katerio - Magazine theme <= 1.5.1 - Local File Inclusion Vulnerability — Katerio - Magazine 8.1 High2025-06-27
CVE-2025-52811 WordPress Davenport - Versatile Blog and Magazine WordPress Theme <= 1.3 - Local File Inclusion Vulnerability — Davenport - Versatile Blog and Magazine WordPress Theme 8.1 High2025-06-27
CVE-2025-49451 WordPress Aeroscroll Gallery – Infinite Scroll Image Gallery & Post Grid with Photo Gallery plugin <= 1.0.13 - Directory Traversal Vulnerability — Aeroscroll Gallery – Infinite Scroll Image Gallery & Post Grid with Photo Gallery 7.5 High2025-06-17
CVE-2025-47176 Microsoft Outlook Remote Code Execution Vulnerability — Microsoft 365 Apps for Enterprise 7.8 High2025-06-10
CVE-2025-30515 CyberData 011209 SIP Emergency Intercom Path Traversal — 011209 SIP Emergency Intercom 9.8 Critical2025-06-09
CVE-2025-39475 WordPress Arlo theme <= 6.0.3 - Local File Inclusion Vulnerability — Arlo 8.1 High2025-06-09
CVE-2025-49295 WordPress MediClinic theme <= 2.1 - Local File Inclusion Vulnerability — MediClinic 8.1 High2025-06-09
CVE-2025-49296 WordPress GrandPrix theme <= 1.6 - Local File Inclusion Vulnerability — GrandPrix 8.1 High2025-06-09
CVE-2025-49297 WordPress Grill and Chow theme <= 1.6 - Local File Inclusion Vulnerability — Grill and Chow 8.1 High2025-06-09
CVE-2025-27445 Extension - rsjoomla.com - A path traversal vulnerability RSFirewall component 2.9.7 - 3.1.5 for Joomla — RSFirewall component for Joomla 6.5AIMediumAI2025-06-05
CVE-2025-5598 WF Steuerungstechnik GmbH - airleader MASTER - Path Traversal — airleader MASTER 7.5AIHighAI2025-06-04
CVE-2025-46441 WordPress Section Widget plugin <= 3.3.1 - Path Traversal vulnerability — Section Widget 5.3 Medium2025-05-19
CVE-2025-27010 WordPress Tastyc < 2.5.2 - Local File Inclusion Vulnerability — Tastyc 8.1 High2025-05-19
CVE-2025-39491 WordPress WHMpress plugin <= 6.2-revision-9 - Local File Inclusion vulnerability — WHMpress 8.1 High2025-05-16
CVE-2025-39492 WordPress WHMpress plugin <= 6.2-revision-9 - Local File Inclusion vulnerability — WHMpress 7.5 High2025-05-16
CVE-2025-40573 Siemens SCALANCE LPE9403 安全漏洞 — SCALANCE LPE9403 4.4 Medium2025-05-13
CVE-2025-47649 WordPress Open Close WooCommerce Store plugin <= 4.9.9 - Local File Inclusion vulnerability — Open Close WooCommerce Store 8.8 High2025-05-07
CVE-2025-47636 WordPress List category posts plugin <= 0.91.0 - Local File Inclusion Vulnerability — List category posts 7.5 High2025-05-07

Vulnerabilities classified as CWE-35 (路径遍历:’…/…//’) represent 149 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.