An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
History

Tue, 29 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 29 Jul 2025 08:00:00 +0000

Type Values Removed Values Added
First Time appeared Xorux
Xorux lpar2rrd
Vendors & Products Xorux
Xorux lpar2rrd

Mon, 28 Jul 2025 23:45:00 +0000

Type Values Removed Values Added
Description An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
Title KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal
Weaknesses CWE-24
CWE-434
CWE-648
References

cve-icon MITRE

Status: PUBLISHED

Assigner: KoreLogic

Published: 2025-07-28T23:34:38.972Z

Updated: 2025-07-29T13:22:11.335Z

Reserved: 2025-07-28T16:02:18.186Z

Link: CVE-2025-54769

cve-icon Vulnrichment

Updated: 2025-07-29T13:20:57.115Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-29T00:15:24.473

Modified: 2025-07-29T14:15:38.010

Link: CVE-2025-54769

cve-icon Redhat

No data.