CVE-2025-54769

An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
Configurations

No configuration.

History

29 Jul 2025, 14:15

Type Values Removed Values Added
Summary
  • (es) Un usuario autenticado de solo lectura puede cargar un archivo y realizar un directory traversal para colocarlo en la ubicación que elija. Esto puede usarse para sobrescribir módulos PERL existentes en la aplicación y lograr la ejecución remota de código (RCE) por parte de un atacante.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

29 Jul 2025, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-29 00:15

Updated : 2025-07-29 14:15


NVD link : CVE-2025-54769

Mitre link : CVE-2025-54769

CVE.ORG link : CVE-2025-54769


JSON object : View

Products Affected

No product.

CWE
CWE-24

Path Traversal: '../filedir'

CWE-434

Unrestricted Upload of File with Dangerous Type

CWE-648

Incorrect Use of Privileged APIs