Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-552 (对外部实体的文件或目录可访问) — Vulnerability Class 198

198 vulnerabilities classified as CWE-552 (对外部实体的文件或目录可访问). AI Chinese analysis included.

CWE-552 represents a critical access control weakness where software improperly exposes files or directories to unauthorized external actors. This vulnerability typically arises when applications store sensitive data within a publicly accessible root directory, such as those used by web or FTP servers, without implementing adequate permission restrictions. Attackers exploit this flaw by directly requesting the paths of these unprotected resources, thereby gaining unauthorized access to confidential information like configuration files, user data, or source code. To prevent such breaches, developers must enforce strict access controls, ensuring that only authenticated and authorized users can retrieve specific files. Additionally, separating sensitive data from public web roots and applying robust file permission settings are essential strategies to mitigate the risk of accidental or malicious exposure to external parties.

MITRE CWE Description
The product makes files or directories accessible to unauthorized actors, even though they should not be. Web servers, FTP servers, and similar servers may store a set of files underneath a "root" directory that is accessible to the server's users. Applications may store sensitive files underneath this root without also using access control to limit which users may request those files, if any. Alternately, an application might package multiple files or directories into an archive file (e.g., ZIP or tar), but the application might not exclude sensitive files that are underneath those directories. In cloud technologies and containers, this weakness might present itself in the form of misconfigured storage accounts that can be read or written by a public or anonymous user.
Common Consequences (1)
Confidentiality, IntegrityRead Files or Directories, Modify Files or Directories
Mitigations (1)
Implementation, System Configuration, OperationWhen storing data in the cloud (e.g., S3 buckets, Azure blobs, Google Cloud Storage, etc.), use the provider's controls to disable public access.
Examples (2)
The following Azure command updates the settings for a storage account:
az storage account update --name <storage-account> --resource-group <resource-group> --allow-blob-public-access true
Bad · Shell
az storage account update --name <storage-account> --resource-group <resource-group> --allow-blob-public-access false
Good · Shell
The following Google Cloud Storage command gets the settings for a storage account named 'BUCKET_NAME':
gsutil iam get gs://BUCKET_NAME
Informative · Shell
{ "bindings":[{ "members":[ "projectEditor: PROJECT-ID", "projectOwner: PROJECT-ID" ], "role":"roles/storage.legacyBucketOwner" }, { "members":[ "allUsers", "projectViewer: PROJECT-ID" ], "role":"roles/storage.legacyBucketReader" } ] }
Bad · JSON
CVE IDTitleCVSSSeverityPublished
CVE-2025-33150 IBM Cognos Analytics Certified Containers information disclosure — Cognos Analytics Certified Containers 5.3 Medium2025-11-10
CVE-2025-58152 Century Systems FutureNet MA-X series 安全漏洞 — FutureNet MA-X series 5.3 Medium2025-10-31
CVE-2025-11965 Eclipse Vert.x 安全漏洞 — Vert.x 7.5AIHighAI2025-10-22
CVE-2025-31996 Unprotected files are impacting HCL Unica Platform — Unica Platform 5.3 Medium2025-10-13
CVE-2025-59976 Junos Space: Arbitrary file download vulnerability in web interface — Junos Space 6.5 Medium2025-10-09
CVE-2025-61734 Apache Kylin: improper restriction of file read — Apache Kylin 9.1AICriticalAI2025-10-02
CVE-2025-3025 CCleaner Link Following Local Privilege Escalation Vulnerability — CCleaner 7.3 High2025-09-15
CVE-2025-59054 dstack has insecure LUKS2 persistent storage partitions that may be opened and used — dstack 9.9 -2025-09-12
CVE-2025-9273 CData API Server MySQL Misconfiguration Information Disclosure Vulnerability — API Server 6.5 -2025-09-02
CVE-2025-52460 DOS & CO SS1 安全漏洞 — SS1 7.5 -2025-08-28
CVE-2025-43758 Liferay Portal和Liferay DXP 安全漏洞 — Portal 7.5AIHighAI2025-08-22
CVE-2009-10005 ContentKeeper Web Appliance < 125.10 Arbitrary File Access via mimencode — Web Appliance 7.5AIHighAI2025-08-20
CVE-2025-43749 Liferay Portal和Liferay DXP 安全漏洞 — Portal 7.5AIHighAI2025-08-20
CVE-2025-23276 NVIDIA GPU Display Driver 安全漏洞 — GPU Display Drivers 7.8 High2025-08-02
CVE-2025-30103 Dell SmartFabric OS10 Software 安全漏洞 — SmartFabric OS10 Software 5.5 Medium2025-07-30
CVE-2025-53536 Roo Code allows Potential Remote Code Execution via .vscode/settings.json — Roo-Code 8.1 High2025-07-07
CVE-2025-49797 Brother Industries Multiple driver installers for Windows 安全漏洞 — Multiple driver installers for Windows 7.8AIHighAI2025-06-25
CVE-2024-56731 Gogs deletion of internal files allows remote command execution — gogs 10.0 Critical2025-06-24
CVE-2025-0620 Samba: smbd doesn't pick up group membership changes when re-authenticating an expired smb session 4.9 Medium2025-06-06
CVE-2025-40908 YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified — YAML::LibYAML 7.5 -2025-06-01
CVE-2025-4634 Local File Inclusion — Airpointer 4.1 Medium2025-05-30
CVE-2025-5273 Markdownify MCP Server 安全漏洞 — mcp-markdownify-server 6.5 Medium2025-05-29
CVE-2025-4134 Lack of file validation in Avast Business Antivirus for Linux allows writing untrusted update files — Avast Business Antivirus 7.3 High2025-05-28
CVE-2025-21264 Visual Studio Code Security Feature Bypass Vulnerability — Microsoft Visual Studio Code CoPilot Chat Extension 7.1 High2025-05-13
CVE-2024-4981 Pagure: _update_file_in_git() follows symbolic links in temporary clones 7.6 High2025-05-12
CVE-2025-32819 SonicWALL SMA100 安全漏洞 — SMA100 8.1AIHighAI2025-05-07
CVE-2025-1982 Local File Inclusion in Ready_ — Ready_ 6.5AIMediumAI2025-04-16
CVE-2025-2222 Schneider Electric ConneXium Network Manager 安全漏洞 — ConneXium Network Manager 7.8 High2025-04-09
CVE-2025-22369 Mennekes smart/premium charges systems, Arbitrary file download using ReadFile endpoint — Smart / Premium charging stations 7.5 -2025-03-11
CVE-2025-25267 Siemens Tecnomatix Plant Simulation 安全漏洞 — Tecnomatix Plant Simulation V2302 6.2 Medium2025-03-11

Vulnerabilities classified as CWE-552 (对外部实体的文件或目录可访问) represent 198 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.