CVE-2025-27920
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Lifecycle Timeline
3Description
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
Analysis
Output Messenger before 2.0.63 contains a directory traversal vulnerability enabling attackers to access files outside the intended directory through path manipulation in parameters.
Technical Context
The CWE-24 path traversal allows crafted requests with directory traversal sequences to read configuration files, credentials, and other sensitive data from the Output Messenger server's filesystem.
Affected Products
['Output Messenger before 2.0.63']
Remediation
Update to 2.0.63+. Review server for evidence of unauthorized file access.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today