CVE-2025-27920
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
Vendor
Product
CWE
Yayın Tarihi
2025-05-05 16:15:50
Güncelleme
2025-11-05 19:28:43
Source Identifier
cve@mitre.org
KEV Date Added
2025-05-19
Kategoriler
Referanslar
https://www.outputmessenger.com/cve-2025-27920/
https://www.srimax.com/products-2/output-messenger/
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27920
https://www.microsoft.com/en-us/security/blog/2025/05/12/marbled-dust-leverages-zero-day-in-output-messenger-for-regional-espionage/