Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-28382: n/a

0
High
VulnerabilityCVE-2025-28382cvecve-2025-28382
Published: Fri Jun 13 2025 (06/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the openc3-api/tables endpoint of OpenC3 COSMOS before 6.1.0 allows attackers to execute a directory traversal.

AI-Powered Analysis

AILast updated: 10/28/2025, 03:58:52 UTC

Technical Analysis

CVE-2025-28382 is a directory traversal vulnerability identified in the openc3-api/tables endpoint of OpenC3 COSMOS software versions before 6.1.0. This vulnerability stems from improper sanitization of user-supplied input in the API endpoint, allowing attackers to manipulate file path parameters to access files outside the intended directory scope. Specifically, the vulnerability corresponds to CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), enabling attackers to traverse directories and read arbitrary files on the server filesystem. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 base score is 7.5, indicating high severity primarily due to the impact on confidentiality (complete disclosure of sensitive files) while integrity and availability remain unaffected. Although no public exploits have been reported yet, the ease of exploitation and potential for sensitive data exposure make this a critical concern. The lack of available patches at the time of disclosure necessitates immediate attention to alternative mitigations such as input validation, network segmentation, and monitoring for suspicious access patterns. OpenC3 COSMOS is used in various operational technology and command and control environments, increasing the risk profile for organizations relying on this platform.

Potential Impact

For European organizations, exploitation of CVE-2025-28382 could lead to unauthorized disclosure of sensitive configuration files, credentials, or operational data stored on OpenC3 COSMOS servers. This breach of confidentiality could facilitate further attacks, including lateral movement or espionage, especially in sectors like critical infrastructure, manufacturing, and defense where OpenC3 COSMOS is deployed. The vulnerability does not directly affect system integrity or availability, but the exposure of sensitive information could undermine trust, cause regulatory compliance issues (e.g., GDPR violations), and lead to operational disruptions if attackers leverage disclosed data for subsequent attacks. Given the remote and unauthenticated nature of the exploit, attackers can target exposed endpoints without insider access, increasing the threat surface. Organizations with interconnected OT and IT environments may face compounded risks if attackers use disclosed information to pivot into other systems.

Mitigation Recommendations

Until an official patch for OpenC3 COSMOS 6.1.0 or later is available, European organizations should implement strict input validation and sanitization on the openc3-api/tables endpoint to block directory traversal sequences such as '../'. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal attempts. Restrict network access to the API endpoint by implementing IP whitelisting and segmentation to limit exposure to trusted sources only. Monitor logs for unusual file access patterns or repeated traversal attempts indicative of exploitation attempts. Conduct regular audits of file permissions on servers to minimize sensitive data exposure if traversal occurs. Once patches are released, prioritize timely deployment and verify the effectiveness of the fix through penetration testing. Additionally, educate security teams about this vulnerability to enhance detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-11T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 684c2c64a8c921274380898f

Added to database: 6/13/2025, 1:49:24 PM

Last enriched: 10/28/2025, 3:58:52 AM

Last updated: 11/22/2025, 6:05:34 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats