CVE-2025-14728

Rapid7 Velociraptor versions before 0.75.6 contain a directory traversal issue on Linux servers that allows a rogue client to upload a file which is written outside the datastore directory. Velociraptor is normally only allowed to write in the datastore directory. The issue occurs due to insufficient sanitization of directory names which end with a ".", only encoding the final "." AS "%2E". Although files can be written to incorrect locations, the containing directory must end with "%2E". This limits the impact of this vulnerability, and prevents it from overwriting critical files.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rapid7:velociraptor:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

20 Feb 2026, 19:37

Type Values Removed Values Added
References () https://docs.velociraptor.app/announcements/advisories/cve-2025-14728/ - () https://docs.velociraptor.app/announcements/advisories/cve-2025-14728/ - Exploit, Patch, Vendor Advisory
CPE cpe:2.3:a:rapid7:velociraptor:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
First Time Linux
Rapid7 velociraptor
Rapid7
Linux linux Kernel

29 Dec 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-29 19:15

Updated : 2026-02-20 19:37


NVD link : CVE-2025-14728

Mitre link : CVE-2025-14728

CVE.ORG link : CVE-2025-14728


JSON object : View

Products Affected

rapid7

  • velociraptor

linux

  • linux_kernel
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')