Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2025-0632", "assignerOrgId": "9c1820ae-fb77-4810-a8aa-ca46e7474d2f", "state": "PUBLISHED", "assignerShortName": "MON-CSIRT", "dateReserved": "2025-01-22T02:10:16.044Z", "datePublished": "2025-04-21T05:27:06.090Z", "dateUpdated": "2025-04-28T02:49:47.566Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Rock Maker Web", "vendor": "Formulatrix", "versions": [{"lessThanOrEqual": "3.18.3.2", "status": "affected", "version": "3.2.1.1", "versionType": "RockMaker Web"}]}], "credits": [{"lang": "en", "type": "finder", "value": "Nicholas Page"}], "datePublic": "2025-04-21T05:20:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p><span style=\"background-color: transparent;\">L</span><span style=\"background-color: transparent;\">ocal File Inclusion (LFI) vulnerability in a Render function of Formulatrix Rock Maker Web (RMW) allows a remote attacker to obtain sensitive data via arbitrary code execution. </span>A malicious actor could execute malicious scripts to automatically download configuration files in known locations to exfiltrate data including credentials, and with no rate limiting a malicious actor could enumerate the filesystem of the host machine and potentially lead to full host compromise.</p><p><span style=\"background-color: transparent;\">This issue affects Rock Maker Web: from 3.2.1.1 and later</span></p><br>\n\n<span style=\"background-color: rgb(255, 255, 255);\"><br><br>\n\n</span><p></p>"}], "value": "Local File Inclusion (LFI) vulnerability in a Render function of Formulatrix Rock Maker Web (RMW) allows a remote attacker to obtain sensitive data via arbitrary code execution.\u00a0A malicious actor could execute malicious scripts to automatically download configuration files in known locations to exfiltrate data including credentials, and with no rate limiting a malicious actor could enumerate the filesystem of the host machine and potentially lead to full host compromise.\n\nThis issue affects Rock Maker Web: from 3.2.1.1 and later"}], "impacts": [{"capecId": "CAPEC-37", "descriptions": [{"lang": "en", "value": "CAPEC-37 Retrieve Embedded Sensitive Data"}]}], "metrics": [{"cvssV4_0": {"Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.2, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "LOW", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:H/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-98", "description": "CWE-98 Improper Control of Filename for Include", "lang": "en", "type": "CWE"}]}, {"descriptions": [{"cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "9c1820ae-fb77-4810-a8aa-ca46e7474d2f", "shortName": "MON-CSIRT", "dateUpdated": "2025-04-28T02:49:47.566Z"}, "references": [{"url": "https://www.formulatrix.com/downloads/apps/repository/rockmaker/"}, {"url": "https://formulatrix.com/downloads/apps/repository/rockmaker/RockMaker%20V3/3.18/3.18.4.7/RockMakerWeb_3.18.4.7_setup.exe"}, {"url": "https://formulatrix.com/downloads/docs/cve/RockMaker/CVE-2025-0632_Security_Bulletin.pdf"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Apply the official security patch provided by Rock Maker or update provided by Formulatrix. If immediate patching is not feasible:<br><ul><li>Restrict external access to RMW from the public internet via firewall rules</li><li>Use network segmentation to limit RMW access only to internal trusted users</li><li>Monitor access logs for suspicious URL patterns such as ../ or unusual GET requests.</li></ul>"}], "value": "Apply the official security patch\u00a0provided by Rock Maker or update provided by Formulatrix.\u00a0If immediate patching is not feasible:\n * Restrict external access to RMW from the public internet via firewall rules\n * Use network segmentation to limit RMW access only to internal trusted users\n * Monitor access logs for suspicious URL patterns such as ../ or unusual GET requests."}], "source": {"discovery": "EXTERNAL"}, "title": "Local File Inclusion (LFI) leading to sensitive data exposure", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-04-21T13:05:47.706729Z", "id": "CVE-2025-0632", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-04-21T13:44:34.233Z"}}]}}