Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
Metrics
Affected Vendors & Products
References
History
Mon, 05 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-22 | |
Metrics |
cvssV3_1
|
Mon, 05 May 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-05-05T00:00:00.000Z
Updated: 2025-05-05T16:02:33.428Z
Reserved: 2025-03-10T00:00:00.000Z
Link: CVE-2025-27920

Updated: 2025-05-05T16:02:19.891Z

Status : Awaiting Analysis
Published: 2025-05-05T16:15:50.857
Modified: 2025-05-05T20:54:19.760
Link: CVE-2025-27920

No data.