CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-59384
8.10.18%

QNAP Qfiling: Organizing Your Secrets for Public Access

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 6, 2026·6 min read·5 visits

PoC Available

Executive Summary (TL;DR)

QNAP's Qfiling application, designed to automate file management, failed to sanitize input paths. This allows unauthenticated remote attackers to traverse the filesystem (via `../`) and read sensitive files like `/etc/shadow`. Patch immediately to version 3.13.1.

A critical unauthenticated path traversal vulnerability in QNAP Qfiling allows remote attackers to read arbitrary system files, turning a handy file-organizing tool into a data exfiltration pipeline.

Official Patches

QNAPQNAP Security Advisory QSA-25-54

Technical Appendix

CVSS Score
8.1/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
EPSS Probability
0.18%
Top 60% most exploited

Affected Systems

QNAP Qfiling < 3.13.1

Affected Versions Detail

Product
Affected Versions
Fixed Version
Qfiling
QNAP
< 3.13.13.13.1
AttributeDetail
CWE IDCWE-22
Attack VectorNetwork (CVSS: AV:N)
Privileges RequiredNone (CVSS: PR:N)
CVSS v4.08.1 (High)
EPSS Score0.18%
ImpactHigh (Confidentiality)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1083File and Directory Discovery
Discovery
T1005Data from Local System
Collection
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Known Exploits & Detection

Hypothetical PoCStandard curl-based path traversal: curl --path-as-is http://target/qfiling/api?file=../../etc/shadow

Vulnerability Timeline

Internal discovery of vulnerability
2025-12-29
CVE-2025-59384 Assigned
2026-01-02
QNAP releases QSA-25-54 and Patch
2026-01-03

References & Sources

  • [1]Official QNAP Advisory
  • [2]NVD CVE-2025-59384

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.