Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-27590 β€” AI Deep Analysis Summary

CVSS 9.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Path Traversal in Oxidized Web < 0.15.0. <br>πŸ”₯ **Consequences**: Attackers control the Linux user account running the service via the RANCID migration page. Full system compromise possible.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-22**: Improper Limitation of a Pathname to a Restricted Directory. <br>⚠️ **Flaw**: Unvalidated user input in the migration feature allows directory traversal, leading to unauthorized file access or execution.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: Oxidized Web (Web UI + RESTful API for Oxidized). <br>πŸ‘₯ **Affected**: Versions **0.15.0 and earlier**. <br>🏒 **Vendor**: ytti (Personal Developer).

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Privileges**: Runs as the `oxidized-web` Linux user. <br>πŸ“‚ **Data**: Can read/write files outside intended directories. <br>⚑ **Impact**: High (CVSS H).…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Auth**: None Required (PR:N). <br>🌐 **Network**: Remote (AV:N). <br>🧩 **Complexity**: High (AC:H). <br>πŸ‘€ **UI**: None Required (UI:N).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’» **PoC Available**: Yes. <br>πŸ”— **Link**: [fatkez/CVE-2025-27590](https://github.com/fatkz/CVE-2025-27590). <br>⚠️ **Note**: PoC describes Command Injection via Multipart Form Upload (`cloginrc`/`file1`).…

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for Oxidized Web instances. <br>πŸ§ͺ **Test**: Attempt RANCID migration with malicious path traversal payloads (e.g., `../../etc/passwd`).…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ”§ **Fixed**: Yes. <br>πŸ“Œ **Version**: **0.15.0**. <br>πŸ”— **Release**: [GitHub Release 0.15.0](https://github.com/ytti/oxidized-web/releases/tag/0.15.0). <br>βœ… **Action**: Upgrade immediately.

Q9What if no patch? (Workaround)

🚫 **No Patch?**: Disable the RANCID migration page if possible. <br>πŸ›‘οΈ **Mitigation**: Restrict network access to the Web UI.…

Q10Is it urgent? (Priority Suggestion)

🚨 **Priority**: **CRITICAL**. <br>⏳ **Urgency**: Immediate. <br>πŸ“‰ **Risk**: Remote Code Execution/Full Compromise. <br>πŸ’‘ **Advice**: Patch now. Do not wait.