
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A path traversal vulnerability (GHSA-6q65-j4jw-9cg8) was discovered in DotVVM applications when running in Debug mode with at least one resource using FileResourceLocation. The vulnerability affects multiple versions including <=4.3.7, 5.0.0-preview01-final, and 5.0.0-preview02-final, with patches available in versions 4.2.10, 4.3.8, and 5.0.0-preview03-final. The issue was published and last updated on June 19, 2025 (GitHub Advisory).
The vulnerability has been assigned a High severity rating with a CVSS score of 7.5. The CVSS metrics indicate it can be exploited over the network (Attack Vector: Network) with low complexity (Attack Complexity: Low), requires no privileges (Privileges Required: None) or user interaction (User Interaction: None). The scope is unchanged, with high impact on confidentiality but no impact on integrity or availability. The vulnerability is classified as CWE-22 (GitHub Advisory).
The vulnerability enables attackers to read arbitrary files from the filesystem that are accessible by the web application. This includes sensitive files such as appsettings.json and other files containing secrets like database passwords (GitHub Advisory).
For immediate mitigation, it is recommended to avoid running publicly accessible DotVVM applications in Debug mode (Development environment in ASP.NET Core). A temporary workaround involves adding 'config.Debug = false;' to the DotvvmStartup class. For a permanent fix, users should update to the patched versions (4.2.10, 4.3.8, or 5.0.0-preview03-final). Additionally, it is strongly recommended to invalidate any secrets that could have been potentially leaked by applications deployed in Debug mode (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”