ZendTo Application Vulnerability Permits Unauthorized Access to Confidential Information

A critical vulnerability in the popular file-sharing tool ZendTo allows authenticated users to traverse system paths and access or modify sensitive files belonging to other users.

Tracked as CVE-2025-34508, the flaw affects ZendTo versions 6.15-7 and earlier. An attacker can exploit this issue to read server logs, user data, or critical application files.

ZendTo released a patch in version 6.15-8, and administrators are urged to update immediately to prevent unauthorized access.

How the Path Traversal Occurs

ZendTo enables users to drop off and pick up large files through a secure web interface.

When files are uploaded, the application relies on two key parameters: chunkName and tmp_name.

Normally, chunkName is generated by client-side scripts and sanitized to include only letters and numbers.

However, if chunkName contains no alphanumeric characters, the code defaults to the base upload directory.

Next, ZendTo concatenates tmp_name with the upload directory path without proper sanitization.

By supplying a specially crafted tmp_name, such as /../../log/zendto/zendto.log, an attacker can move arbitrary files from the server into their personal dropoff.

This relocation reveals the contents when the attacker downloads the dropoff package.

In default setups, any file accessible by the web server user is at risk, including uploaded files, logs, and configuration data.

CVE Details

CVE IDAffected VersionsVulnerability TypeImpactPatch Version
CVE-2025-345086.15-7 and earlierPath traversalUnauthorized file access and modification6.15-8

Proof of Concept and Impact

In a proof of concept, a researcher used a chunkName of . and tmp_name of /../../log/zendto/zendto.log.

The server moved its own log file into the dropoff directory.

The attacker then downloaded the logfile, which contained internal identifiers granting access to all other dropoff data.

With these identifiers, an attacker could systematically retrieve every file ever uploaded by legitimate users.

Beyond data theft, an attacker could target the ZendTo database or core software files.

Removing or corrupting these files would render the service unusable, causing a denial-of-service condition.

This incident underscores that even vulnerabilities requiring a valid login can be powerful when path validation is weak.

Attackers with legitimate credentials gain the ability to probe and manipulate sensitive assets, amplifying the risk far beyond typical account misuse.

ZendTo addressed CVE-2025-34508 in version 6.15-8. Administrators should upgrade without delay.

Users who cannot immediately update can implement a temporary mitigation by restricting filesystem permissions so the web server user cannot read or move files outside its intended directory.

Monitoring server logs for suspicious drop-off activity is also advised.

Application owners should adopt a defense-in-depth approach. Always validate and sanitize user inputs on both client and server sides.

Employ security frameworks that enforce strict path normalization.

Regularly review and test file upload and download logic for path traversal and related issues.

By combining prompt patching, least-privilege permissions, and rigorous input validation, organizations can ensure ZendTo deployments remain secure against emerging threats.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here