{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T11:47:35.579","vulnerabilities":[{"cve":{"id":"CVE-2025-50233","sourceIdentifier":"cve@mitre.org","published":"2025-08-06T15:15:32.013","lastModified":"2025-09-23T18:34:04.457","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in QCMS version 6.0.5 allows authenticated users to read arbitrary files from the server due to insufficient validation of the \"Name\" parameter in the backend template editor. By manipulating the parameter, attackers can perform directory traversal and access sensitive files outside the intended template directory, potentially exposing system configuration, PHP source code, or other sensitive information."},{"lang":"es","value":"Una vulnerabilidad en QCMS 6.0.5 permite a usuarios autenticados leer archivos arbitrarios del servidor debido a una validación insuficiente del parámetro \"Name\" en el editor de plantillas del backend. Al manipular este parámetro, los atacantes pueden realizar un directory traversal y acceder a archivos confidenciales fuera del directorio de la plantilla, lo que podría exponer la configuración del sistema, el código fuente PHP u otra información confidencial."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:q-cms:qcms:6.0.5:*:*:*:*:*:*:*","matchCriteriaId":"3558967A-55CA-489C-82E2-39648D9EA722"}]}]}],"references":[{"url":"https://github.com/xiaoyangsec/cve","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/xiaoyangsec/cve/blob/main/README.md","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]}]}}]}