CVE-2024-42485: Filament Excel Vulnerable to Path Traversal Attack on Export Download Endpoint
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.44496%
CWE
Published
8/12/2024
Updated
9/16/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pxlrbt/filament-excel | composer | >= 2.0.0-alpha, < 2.3.3 | 2.3.3 |
| pxlrbt/filament-excel | composer | < 1.1.14 | 1.1.14 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability exists in the route definition shown in routes/web.php where:
- No authentication middleware was present (added 'signed' middleware in patch)
- Directly used Storage::disk()->path($path) with user-controlled input
- Allowed unrestricted 'path' parameter via '.*' regex pattern
- The patch added signed URL validation and explicit path construction, confirming the original handler lacked security controls