Cyber Posture

CVE-2024-57451

HighPublic PoC

Published: 03 February 2025

Published
03 February 2025
Modified
13 May 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0084 74.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

ChestnutCMS <=1.5.0 has a directory traversal vulnerability in contentcore.controller.FileController#getFileList, which allows attackers to view any directory.

Security Summary

CVE-2024-57451 is a directory traversal vulnerability affecting ChestnutCMS versions up to and including 1.5.0. The flaw resides in the contentcore.controller.FileController#getFileList method, enabling attackers to bypass path restrictions and access arbitrary directories on the server. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), classified as High severity and mapped to CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The vulnerability was published on 2025-02-03.

Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation allows viewing the contents of any directory on the affected system, resulting in high confidentiality impact by exposing potentially sensitive files, while integrity and availability remain unaffected.

Mitigation details are available in the referenced advisory at https://locrian-lightning-dc7.notion.site/Directory-traversal-1628e5e2b1a280fdb463c2235acc7f75.

Details

CWE(s)
CWE-22

Affected Products

1000mz
chestnutcms
≤ 1.5.0

References