CVE-2025-53632

| EUVD-2025-21069 CRITICAL
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 06:52 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 06:52 euvd
EUVD-2025-21069
Patch Released
Mar 16, 2026 - 06:52 nvd
Patch available
CVE Published
Jul 10, 2025 - 20:15 nvd
CRITICAL 9.1

Description

Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 47d188f and shipped in v0.1.4.

Analysis

CVE-2025-53632 is a path traversal vulnerability (zip slip) in Chall-Manager v0.1.3 and earlier that allows unauthenticated attackers to write arbitrary files to the system when processing scenario zip archives. The vulnerability has a CVSS 9.1 severity score due to high integrity and availability impact, though real-world exploitation risk is partially mitigated by deployment recommendations to isolate Chall-Manager within internal infrastructure. A patch is available in v0.1.4 via commit 47d188f.

Technical Context

Chall-Manager is a platform-agnostic challenge orchestration system that processes compressed scenario files (zip archives) to initialize gaming environments. The vulnerability stems from improper input validation during zip file extraction—specifically, the application fails to sanitize file paths extracted from zip entries against directory traversal sequences (e.g., '../../../etc/passwd'). This is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The flaw allows attackers to write files outside the intended extraction directory by crafting malicious zip archives containing path traversal sequences in file names. No authentication or authorization checks are enforced before scenario decoding, making this a completely unauthenticated attack surface.

Affected Products

Chall-Manager versions prior to v0.1.4, specifically v0.1.3 and earlier. The vendor commit 47d188f containing the fix was shipped in release v0.1.4. No specific CPE string data was provided in the source material; affected product scope is: Product: Chall-Manager, Affected Versions: <0.1.4, Fixed Version: >=0.1.4. The vulnerability affects all installations of these versions regardless of platform (system is described as 'platform-agnostic').

Remediation

Immediate remediation: Upgrade Chall-Manager to v0.1.4 or later, which includes the security fix from commit 47d188f. For organizations unable to immediately patch: (1) Restrict network access to Chall-Manager to trusted internal networks only—do not expose on untrusted networks or the internet; (2) Disable or restrict the scenario upload/decoding functionality if not actively in use; (3) Monitor file system activity for unexpected writes outside configured scenario extraction directories; (4) Run Chall-Manager with minimal file system permissions (principle of least privilege—restrict write access to only necessary directories). Post-patch validation: Verify v0.1.4 installation and test zip extraction with benign and adversarial zip archives containing path traversal sequences (e.g., '../test.txt') to confirm the traversal is prevented.

Priority Score

46
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +46
POC: 0

Vendor Status

Share

CVE-2025-53632 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy