- Description
- imFAQ is an advanced questions and answers management system for ImpressCMS. Prior to 1.0.1, if the $_GET['seoOp'] parameter is manipulated to include malicious input (e.g., seoOp=php://filter/read=convert.base64-encode/resource=/var/www/html/config.php), the application could allow an attacker to read sensitive files on the server (Local File Inclusion, LFI). The $_GET['seoOp'] and $_GET['seoArg'] parameters are directly used without sanitization or validation. This is partly mitigated by the fact that the ImpressCMS sensitive files are stored outside the web root, in a folder with a randomized name. The issue has been resolved in imFaq 1.0.1.
- Source
- security-advisories@github.com
- NVD status
- Received
CVSS 4.0
- Type
- Secondary
- Base score
- 6.9
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- MEDIUM
- security-advisories@github.com
- CWE-73
- Hype score
- Not currently trending
Excited to share my latest finding: CVE-2025-29930! 🎉 I discovered a Local File Inclusion (LFI) vulnerability in a plugin for ImpressCMS 🔥 Another contribution to open-source security 🛡️ https://t.co/v2hqIsrkVs
@chux13786509
19 Mar 2025
1961 Impressions
4 Retweets
63 Likes
9 Bookmarks
2 Replies
0 Quotes
CVE-2025-29930 imFAQ is an advanced questions and answers management system for ImpressCMS. Prior to 1.0.1, if the $_GET['seoOp'] parameter is manipulated to include malicious input… https://t.co/ksJalqZdDh
@CVEnew
18 Mar 2025
391 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes