CVE-2025-11031

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-11031
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-11031.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-11031
Published
2025-09-26T17:15:35.257Z
Modified
2025-11-16T12:25:58.920640Z
Severity
  • 5.5 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

A flaw has been found in DataTables up to 1.10.13. The affected element is an unknown function of the file /examples/resources/examples.php. This manipulation of the argument src causes path traversal. It is possible to initiate the attack remotely. The exploit has been published and may be used. Upgrading to version 1.10.15 is sufficient to fix this issue. Patch name: 3b24f99ac4ddb7f9072076b0d07f0b1a408f177a. Upgrading the affected component is advised. This vulnerability was initially reported for code-projects Faculty Management System but appears to affect DataTables as an upstream component instead. The vendor of DataTables explains: "I would suggest that the author upgrade to the latest versions of DataTables (actually, they shouldn't really be deploying that file to their own server at all - it is only relevant for the DataTables examples)."

References

Affected packages

Git / github.com/datatables/datatables

Affected ranges

Type
GIT
Repo
https://github.com/datatables/datatables
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.10.0
1.10.0-beta.1
1.10.0-beta.2
1.10.0-rc.1
1.10.1
1.10.10
1.10.11
1.10.12
1.10.13
1.10.2
1.10.3
1.10.4
1.10.5
1.10.6
1.10.7
1.10.8
1.10.9
1.9.0
1.9.1
1.9.2
1.9.3

Other

BETA_1_8_0_1
BETA_1_8_0_4
RELEASE_1_7_0
RELEASE_1_7_1
RELEASE_1_7_2
RELEASE_1_7_3
RELEASE_1_7_4
RELEASE_1_7_5
RELEASE_1_7_6
RELEASE_1_8_0
RELEASE_1_8_0_2
RELEASE_1_8_0_3
RELEASE_1_8_0_4
RELEASE_1_8_1
RELEASE_1_8_2
RELEASE_1_9_0
RELEASE_1_9_0_BETA_3
RELEASE_1_9_0_beta_1
RELEASE_1_9_0_beta_2
RELEASE_1_9_1
RELEASE_1_9_2
RELEASE_1_9_3