CVE-2025-34076

Public Exploit
Microweber CMS Authenticated Local File Inclusion via Backup API

Description

An authenticated local file inclusion vulnerability exists in Microweber CMS versions <= 1.2.11 through misuse of the backup management API. Authenticated users can abuse the /api/BackupV2/upload and /api/BackupV2/download endpoints to read arbitrary files from the underlying filesystem. By specifying an absolute file path in the src parameter of the upload request, the server may relocate or delete the target file depending on the web service user’s privileges. The corresponding download endpoint can then be used to retrieve the file contents, effectively enabling local file disclosure. This behavior stems from insufficient validation of user-supplied paths and inadequate restrictions on file access and backup logic.

Category

6.1
CVSS
Severity: Medium
CVSS 4.0 •
EPSS 0.04%
Third-Party Advisory vulncheck.com
Affected: Microweber Ltd. CMS
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-34076?
CVE-2025-34076 has been scored as a medium severity vulnerability.
How to fix CVE-2025-34076?
To fix CVE-2025-34076, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-34076 being actively exploited in the wild?
It is possible that CVE-2025-34076 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-34076?
CVE-2025-34076 affects Microweber Ltd. CMS.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.