CVE-2020-25074: MoinMoin vulnerable to remote code execution via cache action
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.93678%
CWE
Published
11/11/2020
Updated
10/7/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moin | pip | < 1.9.11 | 1.9.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper validation of the 'key' parameter in the cache action. The commit diff shows the patched version added a 'valid_key' function to enforce a 40-character hex format, which was missing in the original code. The execute function passed user-controlled 'key' values to _do without checks, enabling path traversal. Both functions are directly involved in processing the malicious input, making them the root cause. The high confidence comes from the explicit addition of validation logic in the patch and the CWE-22 classification aligning with directory traversal via unvalidated inputs.