CVE-2025-67810

In Area9 Rhapsode 1.47.3, an authenticated attacker can exploit the operation, url, and filename parameters via POST request to read arbitrary files from the server filesystem. Fixed in 1.47.4 (#7254) and further versions.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:area9lyceum:rhapsode:1.47.3:*:*:*:*:*:*:*

History

10 Feb 2026, 19:45

Type Values Removed Values Added
References () https://area9.com - () https://area9.com - Product
References () https://security.area9lyceum.com/cve-2025-67810/ - () https://security.area9lyceum.com/cve-2025-67810/ - Vendor Advisory
CPE cpe:2.3:a:area9lyceum:rhapsode:1.47.3:*:*:*:*:*:*:*
First Time Area9lyceum rhapsode
Area9lyceum

09 Jan 2026, 22:16

Type Values Removed Values Added
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

09 Jan 2026, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-09 20:15

Updated : 2026-02-10 19:45


NVD link : CVE-2025-67810

Mitre link : CVE-2025-67810

CVE.ORG link : CVE-2025-67810


JSON object : View

Products Affected

area9lyceum

  • rhapsode
CWE
CWE-125

Out-of-bounds Read