Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24337: CWE-281 Improper Preservation of Permissions in Musing Studio WriteFreely

0
High
VulnerabilityCVE-2025-24337cvecve-2025-24337cwe-281
Published: Mon Jan 20 2025 (01/20/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Musing Studio
Product: WriteFreely

Description

WriteFreely through 0.15.1, when MySQL is used, allows local users to discover credentials by reading config.ini.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:36:40 UTC

Technical Analysis

CVE-2025-24337 identifies a vulnerability in the WriteFreely blogging platform developed by Musing Studio, specifically affecting versions up to 0.15.1 when configured to use MySQL as the backend database. The core issue stems from improper preservation of file permissions (classified under CWE-281), which allows local users on the same system to read the configuration file config.ini. This file contains sensitive database credentials, including usernames and passwords, which should be protected from unauthorized access. The vulnerability does not require any authentication or user interaction, but it does require local access to the host system. Exploiting this vulnerability enables an attacker to obtain database credentials, potentially leading to unauthorized database access, data exfiltration, modification, or deletion, thereby compromising confidentiality, integrity, and availability of the data managed by WriteFreely. The CVSS v3.1 score of 8.4 reflects the high impact and relatively low complexity of exploitation. Although no public exploits are currently known, the vulnerability poses a significant risk in multi-user environments or shared hosting scenarios where local user isolation is weak. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate administrative controls and monitoring.

Potential Impact

The primary impact of this vulnerability is the exposure of MySQL database credentials to any local user on the system running WriteFreely, which can lead to full compromise of the database. Attackers gaining these credentials can access sensitive user data, modify or delete content, and potentially escalate privileges within the application or underlying infrastructure. This threatens confidentiality by exposing private data, integrity by allowing unauthorized data changes, and availability by enabling destructive actions such as data deletion or service disruption. Organizations using WriteFreely in multi-user environments, shared hosting, or with weak local user access controls are particularly vulnerable. The breach of database credentials can also facilitate lateral movement within the network, increasing the overall risk profile. Given the high CVSS score and the critical nature of database credentials, the impact on affected organizations can be severe, including reputational damage, regulatory penalties, and operational downtime.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict file system permissions on the config.ini file to ensure that only the WriteFreely application process and trusted administrators can read it. This typically means setting permissions to be readable only by the application user account and root/administrator accounts. Additionally, local user access to the server should be tightly controlled, limiting login capabilities to trusted personnel and using strong authentication mechanisms. Employing containerization or sandboxing can help isolate the application environment and reduce local user exposure. Monitoring and auditing file access logs for config.ini can help detect unauthorized attempts to read the file. If possible, migrate database credentials to more secure storage solutions such as environment variables or secret management systems that enforce stricter access controls. Organizations should also stay alert for official patches or updates from Musing Studio and apply them promptly once available. Finally, consider network segmentation to limit database access only to necessary hosts and services.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-20T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b1bb7ef31ef0b54e370

Added to database: 2/25/2026, 9:35:23 PM

Last enriched: 2/27/2026, 12:36:40 PM

Last updated: 4/11/2026, 8:55:10 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses