VYPR
Medium severity5.3NVD Advisory· Published Jun 3, 2025· Updated Apr 15, 2026

CVE-2025-41428

CVE-2025-41428

Description

Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in TimeWorks 10.0 to 10.3. If exploited, arbitrary JSON files on the server may be viewed by a remote unauthenticated attacker.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

TimeWorks 10.0 to 10.3 contains a path traversal vulnerability allowing an unauthenticated remote attacker to view arbitrary JSON files on the server.

Vulnerability

Details

CVE-2025-41428 is a path traversal vulnerability (CWE-22) found in the web server module of TimeWorks versions 10.0 through 10.3, developed by Keiyo System Co., LTD. The issue stems from improper limitation of a pathname to a restricted directory, which enables an attacker to bypass access controls and read files outside the intended directories [1][2].

Exploitation

The vulnerability can be exploited remotely by an unauthenticated attacker over the network. No authentication or special privileges are required, and the attack complexity is low. By crafting a malicious request that includes path traversal sequences (e.g., '../'), an attacker can navigate the server's filesystem and access JSON files that should not be publicly exposed [1].

Impact

Successful exploitation allows the attacker to view arbitrary JSON files stored on the server. While the confidentiality impact is limited to JSON files and does not extend to other file types, it could still lead to disclosure of sensitive configuration data, user information, or other confidential data stored in JSON format. There is no impact on integrity or availability [1].

Mitigation

The vendor, Keiyo System Co., LTD, has released a patch for the web server module. Users of TimeWorks versions 10.0 to 10.3 are advised to apply the patch according to the developer's instructions. The disclosure was coordinated by JPCERT/CC, and the vulnerability was reported by Masamu Asato of GMO Cybersecurity by Ierae, Inc. [1][2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.