Linux::Statm::Tiny for Perl before 0.0701 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238.
If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution.
Linux::Statm::Tiny uses Mite to produce the affected code section due to CVE-2025-30672
Metrics
Affected Vendors & Products
References
History
Tue, 01 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 01 Apr 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Linux::Statm::Tiny for Perl before 0.0701 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238. If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution. Linux::Statm::Tiny uses Mite to produce the affected code section due to CVE-2025-30672 | |
Title | Linux::Statm::Tiny for Perl allows untrusted code to be included from the current working directory | |
Weaknesses | CWE-427 | |
References |
|

Status: PUBLISHED
Assigner: CPANSec
Published: 2025-04-01T02:20:40.971Z
Updated: 2025-04-01T18:30:09.318Z
Reserved: 2025-03-31T16:00:05.354Z
Link: CVE-2025-3051

Updated: 2025-04-01T18:30:04.253Z

Status : Awaiting Analysis
Published: 2025-04-01T03:15:18.693
Modified: 2025-04-01T20:26:11.547
Link: CVE-2025-3051

No data.