← Retour aux CVEs
CVE-2025-27920
HIGHCISA KEV7.2
Description
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
Details CVE
Score CVSS v3.17.2
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie5/5/2025
Derniere modification11/5/2025
Sourcekev
Observations honeypot0
CISA KEV
FournisseurSrimax
ProduitOutput Messenger
Nom vulnerabiliteSrimax Output Messenger Directory Traversal Vulnerability
Date ajout KEV2025-05-19
Date limite remediation2025-06-09
Utilise dans ransomwareUnknown
Produits affectes
srimax:output_messenger
Faiblesses (CWE)
CWE-24
References
https://www.outputmessenger.com/cve-2025-27920/(cve@mitre.org)
https://www.srimax.com/products-2/output-messenger/(cve@mitre.org)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27920(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.microsoft.com/en-us/security/blog/2025/05/12/marbled-dust-leverages-zero-day-in-output-messenger-for-regional-espionage/(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.