CVE-2025-70028
Published: 09 March 2026
Summary
CVE-2025-70028 is a high-severity Path Traversal (CWE-22) vulnerability in Sunbird Sunbirded-Portal. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Validates pathnames and filenames to prevent traversal outside intended directories.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing portal directly enables remote exploitation (T1190) resulting in application/system DoS via exploitation (T1499.004).
NVD Description
An issue pertaining to CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4.
Deeper analysisAI
CVE-2025-70028 is a path traversal vulnerability (CWE-22: Improper Limitation of a Pathname to a Restricted Directory) discovered in Sunbird-Ed SunbirdEd-portal version 1.13.4. Published on 2026-03-09, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity primarily due to its potential for significant availability disruption.
Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and without requiring user interaction. Exploitation allows denial-of-service impacts, such as crashing services or causing resource exhaustion, while confidentiality and integrity remain unaffected due to the lack of C or I impact in the CVSS vector.
Mitigation details and advisories are referenced in the following resources: https://gist.github.com/zcxlighthouse/5efe962621a260331fc95ccbfb7f9e7f, https://github.com/Sunbird-Ed, and https://github.com/Sunbird-Ed/SunbirdEd-portal. Security practitioners should review these for patch availability or workarounds specific to the affected component.
Details
- CWE(s)