{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T13:29:54.505","vulnerabilities":[{"cve":{"id":"CVE-2025-44137","sourceIdentifier":"cve@mitre.org","published":"2025-07-29T17:15:33.493","lastModified":"2026-01-20T21:16:02.920","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MapTiler Tileserver-php v2.0 is vulnerable to Directory Traversal. The renderTile function within tileserver.php is responsible for delivering tiles that are stored as files on the server via web request. Creating the path to a file allows the insertion of \"../\" and thus read any file on the web server. Affected GET parameters are \"TileMatrix\", \"TileRow\", \"TileCol\" and \"Format\""},{"lang":"es","value":"MapTiler Tileserver-php v2.0 es vulnerable a Directory Traversal. La función renderTile de tileserver.php se encarga de entregar los mosaicos almacenados como archivos en el servidor mediante una solicitud web. Crear la ruta a un archivo permite insertar \"../\" y, por lo tanto, leer cualquier archivo en el servidor web. Los parámetros GET afectados son \"TileMatrix\", \"TileRow\", \"TileCol\" y \"Format\"."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:maptiler:tileserver_php:2.0:*:*:*:*:*:*:*","matchCriteriaId":"08A42D37-DC8C-4FED-8840-47FDA1818564"}]}]}],"references":[{"url":"https://github.com/maptiler/tileserver-php/commit/4fe14e6164bbe2a3f9e3b3d7acf303e3ec210c8e","source":"cve@mitre.org"},{"url":"https://github.com/maptiler/tileserver-php/issues/167","source":"cve@mitre.org","tags":["Exploit","Issue Tracking"]},{"url":"https://github.com/mheranco/CVE-2025-44137","source":"cve@mitre.org","tags":["Exploit"]}]}}]}