CVE-2025-27920: Directory Traversal Vulnerability
Published: 2024-12-25
Title: Directory Traversal Vulnerability
Impact: Unauthorized file access and potential remote code execution
Affected Versions: All versions earlier than V2.0.63
Fixed Version: V2.0.63
Description
A directory traversal vulnerability was identified in Output Messenger version V2.0.62. This vulnerability allows remote attackers to access or execute arbitrary files by manipulating file paths with `../` sequences. By exploiting this flaw, attackers can navigate outside the intended directory, potentially exposing or modifying sensitive files on the server.
Attackers could access files such as configuration files, sensitive user data, or even source code, and depending on the file contents, this could lead to further exploitation, including remote code execution.
Impact
Successful exploitation of this vulnerability can have severe consequences, including:
- Unauthorized access to sensitive files (e.g., configuration files, source code)
- Potential remote code execution if sensitive files are executed
- Exposure of private information or system configurations
Important: Attackers can potentially exploit this vulnerability to gain unauthorized access to critical system files, leading to further compromise of the affected system.
Fixed Version
This issue has been resolved in Output Messenger version V2.0.63. All users are urged to upgrade to this version to prevent exploitation of this vulnerability.
References
- Fixed Version Download: Download V2.0.63
- Release Notes: View Release Notes
- CVE Identifier: CVE-2025-27920
Acknowledgments
We thank Microsoft Security Response Center for identifying and responsibly disclosing this vulnerability.