Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41368: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Smallsrv Small HTTP

0
High
VulnerabilityCVE-2025-41368cvecve-2025-41368cwe-22
Published: Thu Mar 26 2026 (03/26/2026, 11:37:52 UTC)
Source: CVE Database V5
Vendor/Project: Smallsrv
Product: Small HTTP

Description

Problem in the Small HTTP Server v3.06.36 service. An authenticated path traversal vulnerability in '/' allows remote users to bypass the intended restrictions of SecurityManager and display any file if they have the appropriate permissions outside the document root configured on the server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 12:15:59 UTC

Technical Analysis

CVE-2025-41368 is a vulnerability identified in Small HTTP Server version 3.06.36, specifically related to an unquoted service path in the Windows service configuration for the executable located at 'C:\Program Files (x86)\shttps_mg\http.exe service'. The issue arises because the service path is not enclosed in quotation marks, which causes Windows to interpret the path incorrectly when searching for the executable to run. This misinterpretation allows a local attacker to place a malicious executable with the same name as the service executable in a directory that is searched earlier in the system's PATH environment variable or in a directory higher in the hierarchy, such as 'C:\Program Files (x86)\shttps_mg\http.exe' being interpreted as 'C:\Program.exe' if unquoted. When the service starts, it may execute the attacker's malicious executable instead of the legitimate one. This vulnerability is classified under CWE-428 (Unquoted Search Path or Element) and can lead to arbitrary code execution with the privileges of the service, unauthorized access, or denial of service. The CVSS 4.0 score is 8.5 (high severity), reflecting the ease of exploitation by a local attacker with low privileges and the high impact on confidentiality, integrity, and availability. No user interaction or elevated privileges beyond local access are required, and no known exploits have been reported in the wild as of now. The vulnerability highlights the importance of secure service path configuration and proper quoting in Windows environments to prevent path hijacking attacks.

Potential Impact

The vulnerability allows a local attacker with limited privileges to escalate their capabilities by executing arbitrary code within the context of the Small HTTP Server service. This can lead to unauthorized access to sensitive data, modification or deletion of files, installation of persistent malware, or disruption of the HTTP service, impacting availability. Organizations running Small HTTP Server 3.06.36 on Windows systems are at risk, especially if local access controls are weak or if the service runs with elevated privileges. The attack does not require user interaction, increasing the risk in environments where multiple users have local access. The potential for privilege escalation and system compromise makes this vulnerability particularly dangerous in shared or multi-user systems, development environments, or servers exposed to multiple users. The absence of known exploits in the wild provides a window for remediation, but the high CVSS score indicates that exploitation could have severe consequences for confidentiality, integrity, and availability.

Mitigation Recommendations

1. Immediately audit all Windows services for unquoted service paths, especially those running Small HTTP Server or similar software. 2. Correct the service path by enclosing it in double quotes to ensure Windows correctly interprets the executable location, e.g., "C:\Program Files (x86)\shttps_mg\http.exe" service. 3. Restrict local user permissions to prevent unauthorized users from writing to directories that are part of the service path or system PATH environment variable. 4. Limit physical and network access to systems running the vulnerable service to trusted personnel only. 5. Monitor and log service start events and unexpected executable launches to detect potential exploitation attempts. 6. Apply vendor patches or updates as soon as they become available. 7. Employ application whitelisting to prevent unauthorized executables from running. 8. Educate system administrators about the risks of unquoted service paths and enforce secure configuration baselines. 9. Consider running the service with the least privileges necessary to reduce impact if exploited. 10. Use endpoint detection and response (EDR) tools to detect suspicious local activity related to service execution.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:57:06.080Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c51ff3f4197a8e3baa8dee

Added to database: 3/26/2026, 12:00:51 PM

Last enriched: 3/26/2026, 12:15:59 PM

Last updated: 3/26/2026, 1:01:26 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses