CVE-2025-29930

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-29930
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-29930.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-29930
Aliases
  • GHSA-vrr3-54vc-vwg3
Published
2025-03-18T19:15:51Z
Modified
2025-03-19T09:01:43.934785Z
Summary
[none]
Details

imFAQ is an advanced questions and answers management system for ImpressCMS. Prior to 1.0.1, if the $GET['seoOp'] parameter is manipulated to include malicious input (e.g., seoOp=php://filter/read=convert.base64-encode/resource=/var/www/html/config.php), the application could allow an attacker to read sensitive files on the server (Local File Inclusion, LFI). The $GET['seoOp'] and $_GET['seoArg'] parameters are directly used without sanitization or validation. This is partly mitigated by the fact that the ImpressCMS sensitive files are stored outside the web root, in a folder with a randomized name. The issue has been resolved in imFaq 1.0.1.

References

Affected packages

Git / github.com/impressmodules/imfaq

Affected ranges

Type
GIT
Repo
https://github.com/impressmodules/imfaq
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed