Skip to main content

CVE-2025-28055: n/a

High
VulnerabilityCVE-2025-28055cvecve-2025-28055
Published: Tue May 13 2025 (05/13/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

upset-gal-web v7.1.0 /api/music/v1/cover.ts contains an arbitrary file read vulnerabilit

AI-Powered Analysis

AILast updated: 07/06/2025, 16:11:43 UTC

Technical Analysis

CVE-2025-28055 is a high-severity arbitrary file read vulnerability identified in the upset-gal-web application, specifically in version 7.1.0 within the /api/music/v1/cover.ts endpoint. The vulnerability is classified under CWE-22, which corresponds to improper restriction of a pathname to a restricted directory ('Path Traversal'). This type of flaw allows an attacker to manipulate file path parameters to access files outside the intended directory scope. The vulnerability has a CVSS 3.1 base score of 7.5, indicating a high impact with the vector string AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. This means the vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, and it impacts confidentiality with a high impact, while integrity and availability remain unaffected. The arbitrary file read can lead to unauthorized disclosure of sensitive files on the server hosting upset-gal-web, potentially exposing configuration files, credentials, or other sensitive data that could facilitate further attacks or data breaches. No known exploits are currently reported in the wild, and no patches or vendor information are provided, which may indicate the vulnerability is newly disclosed or the product is niche or less widely tracked. The lack of vendor/project details limits the ability to identify affected ecosystems precisely, but the presence of a specific endpoint and version suggests a web application context, likely used in media or music-related services.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality, especially for companies operating web services that handle sensitive user data or intellectual property related to music or media content. Unauthorized file disclosure could lead to leakage of personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Organizations relying on upset-gal-web or similar software in their digital media infrastructure could face data breaches that compromise customer trust and competitive advantage. Additionally, attackers could leverage disclosed files to escalate attacks, such as gaining credentials or configuration details to pivot deeper into corporate networks. The absence of required authentication and user interaction makes this vulnerability particularly dangerous for publicly accessible services. Given the high connectivity and digital service adoption in Europe, the potential for exploitation could disrupt service confidentiality across multiple sectors including entertainment, digital content providers, and possibly public sector entities using similar software stacks.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to sensitive files on the server by implementing strict input validation and sanitization on all file path parameters, especially in the /api/music/v1/cover.ts endpoint. Employ allowlisting of file paths or names to ensure only intended files can be accessed. Web application firewalls (WAFs) can be configured to detect and block path traversal attempts. Organizations should conduct thorough code reviews and penetration testing to identify and remediate similar path traversal issues elsewhere in their applications. If upset-gal-web is in use, organizations should monitor vendor communications for patches or updates and apply them promptly once available. In the interim, consider isolating the affected service in a segmented network zone with minimal privileges and access controls to limit potential data exposure. Logging and monitoring should be enhanced to detect unusual file access patterns. Finally, review and harden file system permissions to prevent unauthorized file reads even if path traversal is attempted.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aecab0

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 4:11:43 PM

Last updated: 8/12/2025, 1:43:22 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats