Skip to main content

CVE-2025-35430: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in CISA Thorium

Medium
VulnerabilityCVE-2025-35430cvecve-2025-35430cwe-22
Published: Wed Sep 17 2025 (09/17/2025, 16:51:52 UTC)
Source: CVE Database V5
Vendor/Project: CISA
Product: Thorium

Description

CISA Thorium does not adequately validate the paths of downloaded files via 'download_ephemeral' and 'download_children'. A remote, authenticated attacker could access arbitrary files subject to file system permissions. Fixed in 1.1.2.

AI-Powered Analysis

AILast updated: 09/18/2025, 00:14:50 UTC

Technical Analysis

CVE-2025-35430 is a path traversal vulnerability identified in the CISA Thorium software, specifically affecting version 1.0.0. The vulnerability arises due to improper validation of file paths in the functions 'download_ephemeral' and 'download_children'. These functions fail to adequately restrict the pathname to a designated directory, allowing a remote attacker with authenticated access to specify arbitrary file paths. Consequently, the attacker can access files outside the intended directories, limited only by the file system permissions of the Thorium process. This vulnerability is classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as path traversal. The vulnerability does not require user interaction but does require the attacker to have some level of authentication (privileges) on the system. The CVSS v3.1 base score is 5.0 (medium severity), reflecting that the attack vector is network-based, with low attack complexity, requiring privileges, no user interaction, and a scope change. The impact is limited to integrity, as the attacker can potentially manipulate or access files they should not, but confidentiality and availability impacts are not indicated. The vulnerability has been fixed in version 1.1.2 of CISA Thorium. No known exploits are currently reported in the wild. Given the nature of the vulnerability, it could be leveraged to escalate privileges or move laterally within a compromised environment by accessing sensitive configuration or credential files, depending on the permissions of the Thorium process. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially intended security scope, increasing the potential impact.

Potential Impact

For European organizations using CISA Thorium, this vulnerability presents a moderate risk. Organizations that deploy Thorium in environments where authenticated users have limited privileges might face unauthorized access to sensitive files, potentially leading to information disclosure or integrity violations. This could facilitate further attacks such as privilege escalation or lateral movement within networks. Sectors such as government, critical infrastructure, and enterprises relying on Thorium for cybersecurity operations or threat intelligence could be particularly impacted if attackers exploit this flaw to access sensitive operational data or configuration files. The medium severity score suggests that while the vulnerability is not critical, it still poses a meaningful risk, especially in environments where strict access controls are not enforced or where the software runs with elevated privileges. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure. European organizations must consider the potential for targeted attacks, especially given the strategic importance of cybersecurity tools like Thorium in defending against advanced threats.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading CISA Thorium to version 1.1.2 or later, where the path traversal issue has been addressed. Until the update is applied, organizations should implement strict access controls on the Thorium installation directories and limit the privileges of the Thorium service account to the minimum necessary, ensuring it cannot access sensitive files outside its operational scope. Network segmentation and monitoring of authenticated user activities related to file downloads within Thorium can help detect and prevent exploitation attempts. Additionally, organizations should audit logs for unusual file access patterns and implement application-layer controls to validate and sanitize file path inputs where possible. Employing host-based intrusion detection systems (HIDS) to monitor file system access anomalies can provide early warning signs of exploitation attempts. Finally, organizations should educate administrators and users about the risks of path traversal vulnerabilities and enforce strong authentication mechanisms to reduce the risk of unauthorized access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:57:14.280Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cb4e06e5fa2c8b1490b3a2

Added to database: 9/18/2025, 12:10:46 AM

Last enriched: 9/18/2025, 12:14:50 AM

Last updated: 9/18/2025, 3:15:40 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats