MapTiler Tileserver-php v2.0 is vulnerable to Directory...
High severity
Unreviewed
Published
Jul 29, 2025
to the GitHub Advisory Database
•
Updated Jul 29, 2025
Description
Published by the National Vulnerability Database
Jul 29, 2025
Published to the GitHub Advisory Database
Jul 29, 2025
Last updated
Jul 29, 2025
MapTiler Tileserver-php v2.0 is vulnerable to Directory Traversal. The renderTile function within tileserver.php is responsible for delivering tiles that are stored as files on the server via web request. Creating the path to a file allows the insertion of "../" and thus read any file on the web server. Affected GET parameters are "TileMatrix", "TileRow", "TileCol" and "Format"
References