RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch.
Metrics
Affected Vendors & Products
References
History
Fri, 18 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Jul 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch. | |
Title | RomM vulnerable to Authenticated Path Traversal | |
Weaknesses | CWE-26 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-16T19:55:15.844Z
Updated: 2025-07-18T14:21:44.885Z
Reserved: 2025-07-11T19:05:23.827Z
Link: CVE-2025-53908

Updated: 2025-07-18T14:21:29.890Z

Status : Awaiting Analysis
Published: 2025-07-16T20:15:24.857
Modified: 2025-07-18T15:15:28.413
Link: CVE-2025-53908

No data.