A path traversal vulnerability has been reported to affect VioStor. If a remote attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: VioStor 5.1.6 build 20250621 and later
History

Fri, 29 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 29 Aug 2025 17:30:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability has been reported to affect VioStor. If a remote attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: VioStor 5.1.6 build 20250621 and later
Title VioStor
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: qnap

Published: 2025-08-29T17:17:26.199Z

Updated: 2025-08-29T17:46:07.744Z

Reserved: 2025-06-20T05:51:57.033Z

Link: CVE-2025-52861

cve-icon Vulnrichment

Updated: 2025-08-29T17:46:03.333Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-29T18:15:42.777

Modified: 2025-09-02T15:55:35.520

Link: CVE-2025-52861

cve-icon Redhat

No data.