An unauthenticated file download vulnerability exists in LimeSurvey versions from 2.0+ up to and including 2.06+ Build 151014. The application fails to validate serialized input to the admin backup endpoint (`index.php/admin/update/sa/backup`), allowing attackers to specify arbitrary file paths using a crafted `datasupdateinfo` payload. The files are packaged in a ZIP archive and made available for download without authentication. This vulnerability can be exploited to read arbitrary files on the host system, including sensitive OS and configuration files.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 16 Jul 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated file download vulnerability exists in LimeSurvey versions from 2.0+ up to and including 2.06+ Build 151014. The application fails to validate serialized input to the admin backup endpoint (`index.php/admin/update/sa/backup`), allowing attackers to specify arbitrary file paths using a crafted `datasupdateinfo` payload. The files are packaged in a ZIP archive and made available for download without authentication. This vulnerability can be exploited to read arbitrary files on the host system, including sensitive OS and configuration files. | |
| Title | LimeSurvey 2.0+ - 2.06+ Unauthenticated Arbitrary File Download via Serialized Backup Payload | |
| Weaknesses | CWE-22 CWE-306 |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-16T21:05:34.816Z
Updated: 2025-07-17T19:58:52.455Z
Reserved: 2025-04-15T19:15:22.561Z
Link: CVE-2025-34120
Updated: 2025-07-17T19:58:48.318Z
Status : Awaiting Analysis
Published: 2025-07-16T21:15:26.960
Modified: 2025-07-17T21:15:50.197
Link: CVE-2025-34120
No data.