i-doit CMDB 1.12 contains an arbitrary file download vulnerability that allows authenticated attackers to download sensitive files by manipulating the file parameter in index.php. Attackers can send GET requests to index.php with file_manager=image and supply arbitrary file paths like src/config.inc.php to retrieve configuration files and sensitive system data.
PUBLISHED5.2CWE-434
i-doit CMDB 1.12 Arbitrary File Download via file_manager Parameter
Problem type
Affected products
I-Doit
doit CMDB
1.12 - AFFECTED
References
ExploitDB-46133
https://www.exploit-db.com/exploits/46133
Official Product Homepage
https://www.i-doit.org/
Product Reference
https://netcologne.dl.sourceforge.net/project/i-doit/i-doit/1.12/idoit-open-1.12.zip
VulnCheck Advisory: i-doit CMDB 1.12 Arbitrary File Download via file_manager Parameter
https://www.vulncheck.com/advisories/i-doit-cmdb-arbitrary-file-download-via-file-manager-parameter
JSON source
https://cveawg.mitre.org/api/cve/CVE-2019-25582Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2019-25582",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2026-03-21T15:30:40.332Z",
"dateReserved": "2026-03-21T15:29:35.182Z",
"datePublished": "2026-03-21T15:30:40.332Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2026-03-21T15:30:40.332Z"
},
"title": "i-doit CMDB 1.12 Arbitrary File Download via file_manager Parameter",
"descriptions": [
{
"lang": "en",
"value": "i-doit CMDB 1.12 contains an arbitrary file download vulnerability that allows authenticated attackers to download sensitive files by manipulating the file parameter in index.php. Attackers can send GET requests to index.php with file_manager=image and supply arbitrary file paths like src/config.inc.php to retrieve configuration files and sensitive system data."
}
],
"affected": [
{
"vendor": "I-Doit",
"product": "doit CMDB",
"versions": [
{
"version": "1.12",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Unrestricted Upload of File with Dangerous Type",
"cweId": "CWE-434",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.exploit-db.com/exploits/46133",
"name": "ExploitDB-46133",
"tags": [
"exploit"
]
},
{
"url": "https://www.i-doit.org/",
"name": "Official Product Homepage",
"tags": [
"product"
]
},
{
"url": "https://netcologne.dl.sourceforge.net/project/i-doit/i-doit/1.12/idoit-open-1.12.zip",
"name": "Product Reference",
"tags": [
"product"
]
},
{
"url": "https://www.vulncheck.com/advisories/i-doit-cmdb-arbitrary-file-download-via-file-manager-parameter",
"name": "VulnCheck Advisory: i-doit CMDB 1.12 Arbitrary File Download via file_manager Parameter",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS"
},
{
"format": "CVSS",
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
}
}
],
"credits": [
{
"lang": "en",
"value": "Ihsan Sencan",
"type": "finder"
}
]
}
}
}