In Area9 Rhapsode 1.47.3, an authenticated attacker can exploit the operation, url, and filename parameters via POST request to read arbitrary files from the server filesystem. Fixed in 1.47.4 (#7254) and further versions.
References
| Link | Resource |
|---|---|
| https://area9.com | Product |
| https://security.area9lyceum.com/cve-2025-67810/ | Vendor Advisory |
Configurations
History
10 Feb 2026, 19:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://area9.com - Product | |
| References | () https://security.area9lyceum.com/cve-2025-67810/ - Vendor Advisory | |
| CPE | cpe:2.3:a:area9lyceum:rhapsode:1.47.3:*:*:*:*:*:*:* | |
| First Time |
Area9lyceum rhapsode
Area9lyceum |
09 Jan 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-125 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
09 Jan 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-09 20:15
Updated : 2026-02-10 19:45
NVD link : CVE-2025-67810
Mitre link : CVE-2025-67810
CVE.ORG link : CVE-2025-67810
JSON object : View
Products Affected
area9lyceum
- rhapsode
CWE
CWE-125
Out-of-bounds Read
