
The SonicWall Capture Labs threat research team became aware of CVE-2025-34508, a medium-severity (CVSS 6.3) path traversal vulnerability in the ZendTo file transfer application. ZendTo is an open-source, web-based tool commonly used by universities, research institutions, and enterprises to securely exchange large files with external users.
The vulnerability affects versions prior to 6.15-8 and could allow authenticated users to manipulate file paths and access or relocate arbitrary files on the server. This could expose sensitive data, impact service availability, or enable lateral movement within a compromised environment. ZendTo has released version 6.15-8 to address the issue.
CVE-2025-34508 is a path traversal vulnerability found in the file upload logic of ZendTo’s “drop-off” feature. ZendTo uses a chunked upload mechanism for large files. During upload, each file chunk is associated with a chunkName parameter, which typically stores a unique alphanumeric identifier. If chunkName is set to a non-alphanumeric value (e.g., a period), ZendTo will instead store all incoming chunks in the global root upload directory (/zendto/tmp) rather than a specific subdirectory.
Additionally, the tmp_name parameter in the POST body is vulnerable. It is passed to ZendTo’s move_uploaded_file() PHP function without proper sanitization. An attacker can insert path traversal sequences such as ../../ in this parameter to overwrite or move arbitrary files. An example of a malicious request can be seen in Figure 1.
.png)
To trigger the vulnerability:
An attacker with valid ZendTo credentials can exploit the vulnerability to:
To ensure SonicWall customers are protected from exploitation of this vulnerability, the following signature has been released:
Share This Article

An Article By
An Article By
Security News
Security News