CVE-2025-11607: Path Traversal in harry0703 MoneyPrinterTurbo
A weakness has been identified in harry0703 MoneyPrinterTurbo up to 1.2.6. The impacted element is the function upload_music of the file app/controllers/v1/music.py of the component API Endpoint. Executing a manipulation of the argument File can lead to path traversal. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
AI Analysis
Technical Summary
CVE-2025-11607 identifies a path traversal vulnerability in the MoneyPrinterTurbo application developed by harry0703, specifically affecting versions 1.2.0 through 1.2.6. The vulnerability resides in the upload_music function within the app/controllers/v1/music.py file, part of the API endpoint. By manipulating the File argument, an attacker can traverse directories on the server, potentially accessing or modifying files outside the intended directory scope. This flaw can be exploited remotely without user interaction and requires only low-level privileges, making it accessible to a broad range of attackers once they have limited access. The vulnerability does not require authentication, which significantly increases its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability at a low level (VC:L, VI:L, VA:L). Although no active exploitation has been reported, a public exploit is available, which could facilitate future attacks. The lack of patch links suggests that a fix may not yet be publicly released, emphasizing the need for immediate mitigation. This vulnerability could be leveraged to read sensitive configuration files, overwrite critical files, or escalate privileges, depending on the server environment and file permissions.
Potential Impact
The primary impact of CVE-2025-11607 is unauthorized access to the filesystem of servers running vulnerable versions of MoneyPrinterTurbo. Attackers could read sensitive data such as configuration files, credentials, or proprietary information, leading to confidentiality breaches. They might also modify or replace files, potentially injecting malicious code or disrupting application functionality, impacting integrity and availability. For organizations relying on MoneyPrinterTurbo for financial or transactional operations, this could result in data leakage, financial fraud, or service downtime. The vulnerability's remote exploitability and lack of required user interaction increase the risk of automated attacks or worm-like propagation within vulnerable environments. The availability of a public exploit further elevates the threat, as less skilled attackers can leverage it. While no widespread exploitation is currently observed, the potential for targeted attacks against fintech companies, cryptocurrency platforms, or financial services using this software is significant. The impact extends to compliance risks, reputational damage, and operational disruptions.
Mitigation Recommendations
Organizations should immediately assess their use of MoneyPrinterTurbo and identify any instances running affected versions (1.2.0 through 1.2.6). If an official patch or update is released, it should be applied promptly. In the absence of a patch, implement strict input validation and sanitization on the File argument in the upload_music function to prevent directory traversal sequences (e.g., '../'). Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the API endpoint. Restrict file system permissions for the application user to the minimum necessary, preventing access to sensitive directories and files. Monitor logs for suspicious activity related to file uploads or unusual file access patterns. Consider isolating the application in a container or sandbox environment to limit potential damage. Regularly update and audit dependencies and third-party components. Finally, educate development teams about secure coding practices to prevent similar vulnerabilities in future releases.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Singapore, South Korea, Japan, Switzerland, Netherlands
CVE-2025-11607: Path Traversal in harry0703 MoneyPrinterTurbo
Description
A weakness has been identified in harry0703 MoneyPrinterTurbo up to 1.2.6. The impacted element is the function upload_music of the file app/controllers/v1/music.py of the component API Endpoint. Executing a manipulation of the argument File can lead to path traversal. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11607 identifies a path traversal vulnerability in the MoneyPrinterTurbo application developed by harry0703, specifically affecting versions 1.2.0 through 1.2.6. The vulnerability resides in the upload_music function within the app/controllers/v1/music.py file, part of the API endpoint. By manipulating the File argument, an attacker can traverse directories on the server, potentially accessing or modifying files outside the intended directory scope. This flaw can be exploited remotely without user interaction and requires only low-level privileges, making it accessible to a broad range of attackers once they have limited access. The vulnerability does not require authentication, which significantly increases its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability at a low level (VC:L, VI:L, VA:L). Although no active exploitation has been reported, a public exploit is available, which could facilitate future attacks. The lack of patch links suggests that a fix may not yet be publicly released, emphasizing the need for immediate mitigation. This vulnerability could be leveraged to read sensitive configuration files, overwrite critical files, or escalate privileges, depending on the server environment and file permissions.
Potential Impact
The primary impact of CVE-2025-11607 is unauthorized access to the filesystem of servers running vulnerable versions of MoneyPrinterTurbo. Attackers could read sensitive data such as configuration files, credentials, or proprietary information, leading to confidentiality breaches. They might also modify or replace files, potentially injecting malicious code or disrupting application functionality, impacting integrity and availability. For organizations relying on MoneyPrinterTurbo for financial or transactional operations, this could result in data leakage, financial fraud, or service downtime. The vulnerability's remote exploitability and lack of required user interaction increase the risk of automated attacks or worm-like propagation within vulnerable environments. The availability of a public exploit further elevates the threat, as less skilled attackers can leverage it. While no widespread exploitation is currently observed, the potential for targeted attacks against fintech companies, cryptocurrency platforms, or financial services using this software is significant. The impact extends to compliance risks, reputational damage, and operational disruptions.
Mitigation Recommendations
Organizations should immediately assess their use of MoneyPrinterTurbo and identify any instances running affected versions (1.2.0 through 1.2.6). If an official patch or update is released, it should be applied promptly. In the absence of a patch, implement strict input validation and sanitization on the File argument in the upload_music function to prevent directory traversal sequences (e.g., '../'). Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the API endpoint. Restrict file system permissions for the application user to the minimum necessary, preventing access to sensitive directories and files. Monitor logs for suspicious activity related to file uploads or unusual file access patterns. Consider isolating the application in a container or sandbox environment to limit potential damage. Regularly update and audit dependencies and third-party components. Finally, educate development teams about secure coding practices to prevent similar vulnerabilities in future releases.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-10T13:35:53.554Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ea88af5baaa01f1cc5800d
Added to database: 10/11/2025, 4:41:19 PM
Last enriched: 2/24/2026, 9:31:45 PM
Last updated: 3/24/2026, 1:10:08 PM
Views: 144
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.