← Back to CVEs
CVE-2025-27920
HIGHCISA KEV7.2
Description
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
CVE Details
CVSS v3.1 Score7.2
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published5/5/2025
Last Modified11/5/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorSrimax
ProductOutput Messenger
Vulnerability NameSrimax Output Messenger Directory Traversal Vulnerability
KEV Date Added2025-05-19
Remediation Due Date2025-06-09
Ransomware UseUnknown
Affected Products
srimax:output_messenger
Weaknesses (CWE)
CWE-24
References
https://www.outputmessenger.com/cve-2025-27920/(cve@mitre.org)
https://www.srimax.com/products-2/output-messenger/(cve@mitre.org)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27920(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.microsoft.com/en-us/security/blog/2025/05/12/marbled-dust-leverages-zero-day-in-output-messenger-for-regional-espionage/(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.