raspap-webgui has a Directory Traversal vulnerability
High severity
GitHub Reviewed
Published
Jun 27, 2025
to the GitHub Advisory Database
•
Updated Jun 27, 2025
Description
Published by the National Vulnerability Database
Jun 27, 2025
Published to the GitHub Advisory Database
Jun 27, 2025
Reviewed
Jun 27, 2025
Last updated
Jun 27, 2025
RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the
entity
parameter to overwrite arbitrary files writable by the web server via abuse of thetee
command used in shell execution.References