A path traversal vulnerability has been reported to affect VioStor. If a remote attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data.
We have already fixed the vulnerability in the following version:
VioStor 5.1.6 build 20250621 and later
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.qnap.com/en/security-advisory/qsa-25-28 |
![]() ![]() |
History
Fri, 29 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 29 Aug 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A path traversal vulnerability has been reported to affect VioStor. If a remote attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: VioStor 5.1.6 build 20250621 and later | |
Title | VioStor | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: qnap
Published: 2025-08-29T17:17:26.199Z
Updated: 2025-08-29T17:46:07.744Z
Reserved: 2025-06-20T05:51:57.033Z
Link: CVE-2025-52861

Updated: 2025-08-29T17:46:03.333Z

Status : Awaiting Analysis
Published: 2025-08-29T18:15:42.777
Modified: 2025-09-02T15:55:35.520
Link: CVE-2025-52861

No data.