Surreal ToDo 0.6.1.2 contains a local file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the content parameter. Attackers can supply directory traversal sequences through the content parameter in index.php to access sensitive system files like configuration and initialization files.
History

Fri, 06 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Description Surreal ToDo 0.6.1.2 contains a local file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the content parameter. Attackers can supply directory traversal sequences through the content parameter in index.php to access sensitive system files like configuration and initialization files.
Title Surreal ToDo 0.6.1.2 Local File Inclusion via index.php
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-06T12:19:12.132Z

Reserved: 2026-03-06T11:54:08.846Z

Link: CVE-2018-25184

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-06T13:16:00.833

Modified: 2026-03-06T13:16:00.833

Link: CVE-2018-25184

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.