CVE-2025-34076

HIGH

CVSS v3

7.2

HIGH

EPSS Score

44.4%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

An authenticated local file inclusion vulnerability exists in Microweber CMS versions <= 1.2.11 through misuse of the backup management API. Authenticated users can abuse the /api/BackupV2/upload and /api/BackupV2/download endpoints to read arbitrary files from the underlying filesystem. By specifying an absolute file path in the src parameter of the upload request, the server may relocate or delete the target file depending on the web service user’s privileges. The corresponding download endpoi

Technical Details

CVSS v3 Vector
3.1
Published
7/2/2025
Last Modified
8/20/2025

Frequently Asked Questions

What is CVE-2025-34076?

An authenticated local file inclusion vulnerability exists in Microweber CMS versions <= 1.2.11 through misuse of the backup management API. Authenticated users can abuse the /api/BackupV2/upload and /api/BackupV2/download endpoints to read arbitrary files from the underlying filesystem. By specifying an absolute file path in the src parameter of the upload request, the server may relocate or delete the target file depending on the web service user’s privileges. The corresponding download endpoi

Is CVE-2025-34076 actively exploited?

Active exploitation of CVE-2025-34076 has not been confirmed. The EPSS score is 44.4%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-34076?

CVE-2025-34076 has a CVSS v3 base score of 7.2 (HIGH severity), with vector string 3.1.

Is CVE-2025-34076 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.