Surreal ToDo 0.6.1.2 contains a local file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the content parameter. Attackers can supply directory traversal sequences through the content parameter in index.php to access sensitive system files like configuration and initialization files.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getsurreal
Getsurreal surreal Todo |
|
| Vendors & Products |
Getsurreal
Getsurreal surreal Todo |
Fri, 06 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Surreal ToDo 0.6.1.2 contains a local file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the content parameter. Attackers can supply directory traversal sequences through the content parameter in index.php to access sensitive system files like configuration and initialization files. | |
| Title | Surreal ToDo 0.6.1.2 Local File Inclusion via index.php | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-03-06T12:19:12.132Z
Updated: 2026-03-06T12:19:12.132Z
Reserved: 2026-03-06T11:54:08.846Z
Link: CVE-2018-25184
No data.
Status : Awaiting Analysis
Published: 2026-03-06T13:16:00.833
Modified: 2026-03-09T13:35:34.633
Link: CVE-2018-25184
No data.