Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-65346

EPSS 0.21% · P44
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-65346

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
alexusmai laravel-file-manager 3.3.1 and below is vulnerable to Directory Traversal. The unzip/extraction functionality improperly allows archive contents to be written to arbitrary locations on the filesystem due to insufficient validation of extraction paths.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Laravel File Manager 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Laravel File Manager是Aleksandr Manekin个人开发者的一个Laravel文件管理器。 Laravel File Manager 3.3.1及之前版本存在安全漏洞,该漏洞源于解压缩功能未充分验证提取路径,可能导致目录遍历攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2025-65346

#POC DescriptionSource LinkShenlong Link
1A Path Traversal vulnerability in the unzip/extract functionality of the affected application allows an attacker to write files to arbitrary filesystem locations during archive extraction. Because the extraction routine fails to sanitize destination paths inside ZIP entries, an attacker can craft ZIP archives containing traversal sequences (e.g., .https://github.com/Theethat-Thamwasin/CVE-2025-65346POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-65346

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-12-04 · 32 CVEs total

CVE-2025-140124.7 MEDIUMJIZHICMS Batch Delete Comments deleteAll.html delete sql injection
CVE-2025-140114.7 MEDIUMJIZHICMS Add Display Name Field addcomment.html commentlist sql injection
CVE-2025-140132.4 LOWJIZHICMS Comment addcomment.html cross site scripting
CVE-2025-66373Akamai Ghost 安全漏洞
CVE-2025-65899Kalmia 安全漏洞
CVE-2025-63363Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-63361Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-63362Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-65637Logrus 安全漏洞
CVE-2025-65806e-point CMS 安全漏洞
CVE-2025-29268ALLNET ALL-RUT22GW v3.3.8 安全漏洞
CVE-2025-29269ALLNET ALL-RUT22GW 安全漏洞
CVE-2025-65883Genexis Platinum P4410 安全漏洞
CVE-2025-63499SOGo 安全漏洞
CVE-2025-63896JXL 9 Inch Car Android Double Din Player 安全漏洞
CVE-2025-55948X-SpringBoot 安全漏洞
CVE-2025-65900Kalmia 安全漏洞
CVE-2025-63364Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-65516Seafile Community Edition 安全漏洞
CVE-2025-61148EduplusCampus 安全漏洞

Showing top 20 of 32 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-65346

No comments yet


Leave a comment