CVE-2026-25575 PUBLISHED

NavigaTUM has a Path Traversal Vulnerability in the propose_edits functionality

Assigner: GitHub_M
Reserved: 03.02.2026 Published: 04.02.2026 Updated: 04.02.2026

NavigaTUM is a website and API to search for rooms, buildings and other places. Prior to commit 86f34c7, there is a path traversal vulnerability in the propose_edits endpoint allows unauthenticated users to overwrite files in directories writable by the application user (e.g., /cdn). By supplying unsanitized file keys containing traversal sequences (e.g., ../../) in the JSON payload, an attacker can escape the intended temporary directory and replace public facing images or fill the server's storage. This issue has been patched via commit 86f34c7.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
CVSS Score: 8.8

Product Status

Vendor TUM-Dev
Product NavigaTUM
Versions
  • Version < 86f34c72886a59ec8f1e6c00f78a5ab889a70fd0 is affected

References

Problem Types

  • CWE-23: Relative Path Traversal CWE
  • CWE-26: Path Traversal: '/dir/../filename' CWE