CVE-2025-14728: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Rapid7 Velociraptor
Rapid7 Velociraptor versions before 0.75.6 contain a directory traversal issue on Linux servers that allows a rogue client to upload a file which is written outside the datastore directory. Velociraptor is normally only allowed to write in the datastore directory. The issue occurs due to insufficient sanitization of directory names which end with a ".", only encoding the final "." AS "%2E". Although files can be written to incorrect locations, the containing directory must end with "%2E". This limits the impact of this vulnerability, and prevents it from overwriting critical files.
AI Analysis
Technical Summary
CVE-2025-14728 is a directory traversal vulnerability identified in Rapid7 Velociraptor versions before 0.75.6, specifically affecting Linux server deployments. Velociraptor is a digital forensics and endpoint monitoring tool that typically restricts file writes to a designated datastore directory. The vulnerability arises from insufficient sanitization of directory names that end with a dot ('.'). While the system encodes the final dot as "%2E", this encoding is insufficient to prevent directory traversal, allowing a rogue client to upload files outside the intended datastore directory. However, the exploit is constrained by the requirement that the target directory must end with "%2E", which limits the ability to overwrite critical system files or directories. The vulnerability impacts the integrity of the system by enabling unauthorized file placement, potentially allowing attackers to tamper with forensic data or implant malicious files that could affect incident response activities. The CVSS 3.1 score of 6.8 reflects a medium severity with a network attack vector, high attack complexity, no privileges required, and no user interaction needed. No known exploits have been reported in the wild, but the vulnerability presents a risk to organizations relying on Velociraptor for security monitoring and forensic investigations. The issue highlights the importance of robust input validation and strict directory traversal protections in security tools that handle sensitive data.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of forensic and monitoring data managed by Velociraptor. Attackers exploiting this flaw could place unauthorized files outside the designated datastore, potentially leading to tampering with incident response evidence or insertion of malicious payloads that evade detection. Although the overwrite scope is limited and critical system files cannot be directly overwritten, the ability to write files outside the intended directory undermines trust in the tool's data integrity. This could impact organizations in sectors with stringent compliance requirements such as finance, healthcare, and critical infrastructure, where forensic accuracy is paramount. Additionally, organizations using Velociraptor in managed detection and response (MDR) services or security operations centers (SOCs) could face operational disruptions or false incident data. The medium severity rating suggests that while the vulnerability is not trivially exploitable, it requires careful attention to patching and monitoring to prevent potential misuse.
Mitigation Recommendations
1. Upgrade Velociraptor to version 0.75.6 or later immediately, as this version addresses the directory traversal vulnerability. 2. Implement strict input validation on directory and file names, ensuring that any special characters such as dots or encoded sequences cannot be used to escape the intended datastore directory. 3. Employ file integrity monitoring on the Velociraptor datastore and adjacent directories to detect unauthorized file writes or modifications. 4. Restrict network access to Velociraptor server endpoints to trusted clients only, minimizing exposure to rogue clients attempting exploitation. 5. Conduct regular audits of Velociraptor logs and uploaded files to identify anomalous activity indicative of exploitation attempts. 6. Consider deploying application-layer firewalls or intrusion detection systems with rules tailored to detect suspicious path traversal patterns targeting Velociraptor. 7. Educate security teams about this specific vulnerability to ensure rapid response and remediation in case of detection.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy
CVE-2025-14728: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Rapid7 Velociraptor
Description
Rapid7 Velociraptor versions before 0.75.6 contain a directory traversal issue on Linux servers that allows a rogue client to upload a file which is written outside the datastore directory. Velociraptor is normally only allowed to write in the datastore directory. The issue occurs due to insufficient sanitization of directory names which end with a ".", only encoding the final "." AS "%2E". Although files can be written to incorrect locations, the containing directory must end with "%2E". This limits the impact of this vulnerability, and prevents it from overwriting critical files.
AI-Powered Analysis
Technical Analysis
CVE-2025-14728 is a directory traversal vulnerability identified in Rapid7 Velociraptor versions before 0.75.6, specifically affecting Linux server deployments. Velociraptor is a digital forensics and endpoint monitoring tool that typically restricts file writes to a designated datastore directory. The vulnerability arises from insufficient sanitization of directory names that end with a dot ('.'). While the system encodes the final dot as "%2E", this encoding is insufficient to prevent directory traversal, allowing a rogue client to upload files outside the intended datastore directory. However, the exploit is constrained by the requirement that the target directory must end with "%2E", which limits the ability to overwrite critical system files or directories. The vulnerability impacts the integrity of the system by enabling unauthorized file placement, potentially allowing attackers to tamper with forensic data or implant malicious files that could affect incident response activities. The CVSS 3.1 score of 6.8 reflects a medium severity with a network attack vector, high attack complexity, no privileges required, and no user interaction needed. No known exploits have been reported in the wild, but the vulnerability presents a risk to organizations relying on Velociraptor for security monitoring and forensic investigations. The issue highlights the importance of robust input validation and strict directory traversal protections in security tools that handle sensitive data.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of forensic and monitoring data managed by Velociraptor. Attackers exploiting this flaw could place unauthorized files outside the designated datastore, potentially leading to tampering with incident response evidence or insertion of malicious payloads that evade detection. Although the overwrite scope is limited and critical system files cannot be directly overwritten, the ability to write files outside the intended directory undermines trust in the tool's data integrity. This could impact organizations in sectors with stringent compliance requirements such as finance, healthcare, and critical infrastructure, where forensic accuracy is paramount. Additionally, organizations using Velociraptor in managed detection and response (MDR) services or security operations centers (SOCs) could face operational disruptions or false incident data. The medium severity rating suggests that while the vulnerability is not trivially exploitable, it requires careful attention to patching and monitoring to prevent potential misuse.
Mitigation Recommendations
1. Upgrade Velociraptor to version 0.75.6 or later immediately, as this version addresses the directory traversal vulnerability. 2. Implement strict input validation on directory and file names, ensuring that any special characters such as dots or encoded sequences cannot be used to escape the intended datastore directory. 3. Employ file integrity monitoring on the Velociraptor datastore and adjacent directories to detect unauthorized file writes or modifications. 4. Restrict network access to Velociraptor server endpoints to trusted clients only, minimizing exposure to rogue clients attempting exploitation. 5. Conduct regular audits of Velociraptor logs and uploaded files to identify anomalous activity indicative of exploitation attempts. 6. Consider deploying application-layer firewalls or intrusion detection systems with rules tailored to detect suspicious path traversal patterns targeting Velociraptor. 7. Educate security teams about this specific vulnerability to ensure rapid response and remediation in case of detection.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- rapid7
- Date Reserved
- 2025-12-15T16:45:47.021Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695450b2db813ff03e2bee77
Added to database: 12/30/2025, 10:22:42 PM
Last enriched: 12/30/2025, 11:13:52 PM
Last updated: 2/3/2026, 9:57:14 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8461: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Seres Software syWEB
HighResearchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
MediumCVE-2025-8456: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website
HighCVE-2024-34021: Unrestricted upload of file with dangerous type in ELECOM CO.,LTD. WRC-1167GST2
MediumCVE-2024-25579: OS command injection in ELECOM CO.,LTD. WRC-1167GS2-B
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.