Static Web Server (SWS) is a production-ready web server suitable for static web files or assets. Versions 2.40.0 and below contain symbolic links (symlinks) which can be used to access files or directories outside the intended web root folder. SWS generally does not prevent symlinks from escaping the web server’s root directory. Therefore, if a malicious actor gains access to the web server’s root directory, they could create symlinks to access other files outside the designated web root folder either by URL or via the directory listing. This issue is fixed in version 2.40.1.
History

Tue, 09 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Static-web-server Project
Static-web-server Project static-web-server
Vendors & Products Static-web-server Project
Static-web-server Project static-web-server

Tue, 09 Dec 2025 04:00:00 +0000

Type Values Removed Values Added
Description Static Web Server (SWS) is a production-ready web server suitable for static web files or assets. Versions 2.40.0 and below contain symbolic links (symlinks) which can be used to access files or directories outside the intended web root folder. SWS generally does not prevent symlinks from escaping the web server’s root directory. Therefore, if a malicious actor gains access to the web server’s root directory, they could create symlinks to access other files outside the designated web root folder either by URL or via the directory listing. This issue is fixed in version 2.40.1.
Title Static Web Server is vulnerable to symbolic link Path Traversal
Weaknesses CWE-61
References
Metrics cvssV4_0

{'score': 5.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-12-09T03:35:58.257Z

Updated: 2025-12-09T16:02:20.028Z

Reserved: 2025-12-08T18:02:08.846Z

Link: CVE-2025-67487

cve-icon Vulnrichment

Updated: 2025-12-09T14:23:23.025Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-09T16:18:24.053

Modified: 2025-12-09T18:36:53.557

Link: CVE-2025-67487

cve-icon Redhat

No data.