Unrated severityNVD Advisory· Published Feb 4, 2026· Updated Feb 5, 2026
NavigaTUM has a Path Traversal Vulnerability in the propose_edits functionality
CVE-2026-25575
Description
NavigaTUM is a website and API to search for rooms, buildings and other places. Prior to commit 86f34c7, there is a path traversal vulnerability in the propose_edits endpoint allows unauthenticated users to overwrite files in directories writable by the application user (e.g., /cdn). By supplying unsanitized file keys containing traversal sequences (e.g., ../../) in the JSON payload, an attacker can escape the intended temporary directory and replace public facing images or fill the server's storage. This issue has been patched via commit 86f34c7.
Affected products
2- TUM-Dev/NavigaTUMv5Range: < 86f34c72886a59ec8f1e6c00f78a5ab889a70fd0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/TUM-Dev/NavigaTUM/commit/86f34c72886a59ec8f1e6c00f78a5ab889a70fd0mitrex_refsource_MISC
- github.com/TUM-Dev/NavigaTUM/pull/2650mitrex_refsource_MISC
- github.com/TUM-Dev/NavigaTUM/security/advisories/GHSA-59hj-f48w-hjfmmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.