CVE-2025-55202
August 29, 2025
Opencast is a free, open-source platform to support the management of educational audio and video content. In version 18.0 and versions before 17.7, the protections against path traversal attacks in the UI config module are insufficient, still partially allowing for attacks in very specific cases. The path is checked without checking for the file separator. This could allow attackers access to files within another folder which starts with the same path. This issue has been fixed in versions 17.7 and 18.1. To mitigate this issue, check for folders that start with the same path as the ui-config folder.
Affected Packages
https://github.com/opencast/opencast.git (GITHUB):
Affected version(s) =18.0 <18.1Fix Suggestion:
Update to version 18.1https://github.com/opencast/opencast.git (GITHUB):
Affected version(s) >=1.3-rc1 <17.7Fix Suggestion:
Update to version 17.7https://github.com/opencast/opencast.git (GITHUB):
Affected version(s) =18.0 <18.1Fix Suggestion:
Update to version 18.1https://github.com/opencast/opencast.git (GITHUB):
Affected version(s) >=1.3-rc1 <17.7Fix Suggestion:
Update to version 17.7Related ResourcesĀ (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
2.7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
Exploit Maturity
UNREPORTED
CVSS v3
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Relative Path Traversal
EPSS
Base Score:
0.07