CVE-2024-43011

An arbitrary file deletion vulnerability exists in the admin/del.php file at line 62 in ZZCMS 2023 and earlier. Due to insufficient validation and sanitization of user input for file paths, an attacker can exploit this vulnerability by using directory traversal techniques to delete arbitrary files on the server. This can lead to the deletion of critical files, potentially disrupting the normal operation of the system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:*

History

21 Apr 2025, 14:57

Type Values Removed Values Added
First Time Zzcms zzcms
Zzcms
References () http://www.zzcms.net/about/download.html - () http://www.zzcms.net/about/download.html - Broken Link
References () https://github.com/gkdgkd123/codeAudit/blob/main/CVE-2024-43011%20ZZCMS2023%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4%E6%BC%8F%E6%B4%9E.md - () https://github.com/gkdgkd123/codeAudit/blob/main/CVE-2024-43011%20ZZCMS2023%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4%E6%BC%8F%E6%B4%9E.md - Broken Link
CPE cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:*

Information

Published : 2024-08-16 20:15

Updated : 2025-04-21 14:57


NVD link : CVE-2024-43011

Mitre link : CVE-2024-43011

CVE.ORG link : CVE-2024-43011


JSON object : View

Products Affected

zzcms

  • zzcms
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')