{"api_version":"1","generated_at":"2026-04-14T06:58:12+00:00","cve":"CVE-2020-25248","urls":{"html":"https://cve.report/CVE-2020-25248","api":"https://cve.report/api/cve/CVE-2020-25248.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-25248","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-25248"},"summary":{"title":"CVE-2020-25248","description":"An issue was discovered in Hyland OnBase through 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. Directory traversal exists for reading files, as demonstrated by the FileName parameter.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-09-11 03:15:00","updated_at":"2022-06-30 16:43:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://seclists.org/fulldisclosure/2020/Oct/9","name":"https://seclists.org/fulldisclosure/2020/Oct/9","refsource":"MISC","tags":[],"title":"Full Disclosure: Re: Navy Federal Reflective Cross Site Scripting (XSS)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://seclists.org/fulldisclosure/2020/Sep/21","name":"https://seclists.org/fulldisclosure/2020/Sep/21","refsource":"MISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: Hyland OnBase 19.x and below - Path Traversal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2020/Oct/9","name":"20201006 Re: Navy Federal Reflective Cross Site Scripting (XSS)","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: Re: Navy Federal Reflective Cross Site Scripting (XSS)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-25248","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25248","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"25248","vulnerable":"1","versionEndIncluding":"16.0.2.83","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25248","vulnerable":"1","versionEndIncluding":"17.0.2.109","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25248","vulnerable":"1","versionEndIncluding":"18.0.0.32","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25248","vulnerable":"1","versionEndIncluding":"18.0.0.37","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25248","vulnerable":"1","versionEndIncluding":"19.8.16.1000","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25248","vulnerable":"1","versionEndIncluding":"19.8.9.1000","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25248","vulnerable":"1","versionEndIncluding":"20.3.10.1000","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-25248","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Hyland OnBase through 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. Directory traversal exists for reading files, as demonstrated by the FileName parameter."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://seclists.org/fulldisclosure/2020/Sep/21","refsource":"MISC","name":"https://seclists.org/fulldisclosure/2020/Sep/21"},{"refsource":"FULLDISC","name":"20201006 Re: Navy Federal Reflective Cross Site Scripting (XSS)","url":"http://seclists.org/fulldisclosure/2020/Oct/9"},{"refsource":"MISC","name":"https://seclists.org/fulldisclosure/2020/Oct/9","url":"https://seclists.org/fulldisclosure/2020/Oct/9"}]}},"nvd":{"publishedDate":"2020-09-11 03:15:00","lastModifiedDate":"2022-06-30 16:43:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0.0","versionEndIncluding":"17.0.2.109","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*","versionStartIncluding":"20.0.0.0","versionEndIncluding":"20.3.10.1000","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*","versionStartIncluding":"19.0.0.0","versionEndIncluding":"19.8.16.1000","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*","versionStartIncluding":"18.0.0.0","versionEndIncluding":"18.0.0.37","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*","versionEndIncluding":"16.0.2.83","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"25248","Ordinal":"186659","Title":"CVE-2020-25248","CVE":"CVE-2020-25248","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"25248","Ordinal":"1","NoteData":"An issue was discovered in Hyland OnBase through 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. Directory traversal exists for reading files, as demonstrated by the FileName parameter.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"25248","Ordinal":"2","NoteData":"2020-09-10","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"25248","Ordinal":"3","NoteData":"2020-11-09","Type":"Other","Title":"Modified"}]}}}