CVE-2025-47423: CWE-24 Path Traversal: '../filedir' in pwsdashboard Personal Weather Station Dashboard
Personal Weather Station Dashboard 12_lts allows unauthenticated remote attackers to read arbitrary files via ../ directory traversal in the test parameter to /others/_test.php, as demonstrated by reading the server's private SSL key in cleartext.
AI Analysis
Technical Summary
CVE-2025-47423 is a path traversal vulnerability identified in version 12_lts of the Personal Weather Station Dashboard (pwsdashboard) software. This vulnerability arises due to improper sanitization of the 'test' parameter in the /others/_test.php endpoint, allowing unauthenticated remote attackers to manipulate the file path by including '../' sequences. Exploiting this flaw enables attackers to read arbitrary files on the server's filesystem. A notable demonstration of this exploit is the ability to read the server's private SSL key in cleartext, which is a critical security asset. The vulnerability is classified under CWE-24 (Improper Restriction of File Name in a Pathname), indicating a failure to properly restrict file path inputs. The CVSS v3.1 base score is 5.8 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C). The impact primarily affects confidentiality, as attackers can access sensitive files without authentication, but does not affect integrity or availability. No known exploits are reported in the wild as of the publication date (May 7, 2025). No patches are currently linked, suggesting that remediation may require vendor action or manual mitigation. The vulnerability's exploitation is straightforward due to lack of authentication and low complexity, making it a significant concern for deployments of this software, especially where sensitive data is stored on the server.
Potential Impact
For European organizations using the Personal Weather Station Dashboard 12_lts, this vulnerability poses a significant risk to the confidentiality of sensitive information. The ability to read arbitrary files, including private SSL keys, can lead to further compromise such as man-in-the-middle attacks, decryption of encrypted communications, and unauthorized access to internal systems. Organizations relying on this software for weather data collection or integration may inadvertently expose critical infrastructure or private data. Given the GDPR and other stringent data protection regulations in Europe, unauthorized disclosure of sensitive data could result in regulatory penalties and reputational damage. Additionally, if the server hosts other sensitive files or credentials, attackers could leverage this access to escalate privileges or move laterally within the network. The medium CVSS score reflects the moderate but tangible risk, especially since exploitation requires no authentication and can be performed remotely. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers could develop exploits rapidly once the vulnerability is public.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are running the affected version (12_lts) of the Personal Weather Station Dashboard. Immediate steps include restricting external access to the /others/_test.php endpoint via network controls such as firewalls or web application firewalls (WAFs) to block suspicious path traversal patterns (e.g., '../'). Implement input validation and sanitization on the 'test' parameter to disallow directory traversal sequences. If vendor patches become available, apply them promptly. In the absence of patches, consider disabling or removing the vulnerable endpoint if it is not essential for operations. Additionally, audit the server for exposure of sensitive files and rotate any potentially compromised credentials or keys, especially SSL private keys. Employ monitoring and alerting for unusual file access patterns and conduct regular vulnerability assessments. Finally, segment the network to limit the impact of potential breaches and ensure that sensitive files are stored with strict access controls and encryption at rest.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-47423: CWE-24 Path Traversal: '../filedir' in pwsdashboard Personal Weather Station Dashboard
Description
Personal Weather Station Dashboard 12_lts allows unauthenticated remote attackers to read arbitrary files via ../ directory traversal in the test parameter to /others/_test.php, as demonstrated by reading the server's private SSL key in cleartext.
AI-Powered Analysis
Technical Analysis
CVE-2025-47423 is a path traversal vulnerability identified in version 12_lts of the Personal Weather Station Dashboard (pwsdashboard) software. This vulnerability arises due to improper sanitization of the 'test' parameter in the /others/_test.php endpoint, allowing unauthenticated remote attackers to manipulate the file path by including '../' sequences. Exploiting this flaw enables attackers to read arbitrary files on the server's filesystem. A notable demonstration of this exploit is the ability to read the server's private SSL key in cleartext, which is a critical security asset. The vulnerability is classified under CWE-24 (Improper Restriction of File Name in a Pathname), indicating a failure to properly restrict file path inputs. The CVSS v3.1 base score is 5.8 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C). The impact primarily affects confidentiality, as attackers can access sensitive files without authentication, but does not affect integrity or availability. No known exploits are reported in the wild as of the publication date (May 7, 2025). No patches are currently linked, suggesting that remediation may require vendor action or manual mitigation. The vulnerability's exploitation is straightforward due to lack of authentication and low complexity, making it a significant concern for deployments of this software, especially where sensitive data is stored on the server.
Potential Impact
For European organizations using the Personal Weather Station Dashboard 12_lts, this vulnerability poses a significant risk to the confidentiality of sensitive information. The ability to read arbitrary files, including private SSL keys, can lead to further compromise such as man-in-the-middle attacks, decryption of encrypted communications, and unauthorized access to internal systems. Organizations relying on this software for weather data collection or integration may inadvertently expose critical infrastructure or private data. Given the GDPR and other stringent data protection regulations in Europe, unauthorized disclosure of sensitive data could result in regulatory penalties and reputational damage. Additionally, if the server hosts other sensitive files or credentials, attackers could leverage this access to escalate privileges or move laterally within the network. The medium CVSS score reflects the moderate but tangible risk, especially since exploitation requires no authentication and can be performed remotely. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers could develop exploits rapidly once the vulnerability is public.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are running the affected version (12_lts) of the Personal Weather Station Dashboard. Immediate steps include restricting external access to the /others/_test.php endpoint via network controls such as firewalls or web application firewalls (WAFs) to block suspicious path traversal patterns (e.g., '../'). Implement input validation and sanitization on the 'test' parameter to disallow directory traversal sequences. If vendor patches become available, apply them promptly. In the absence of patches, consider disabling or removing the vulnerable endpoint if it is not essential for operations. Additionally, audit the server for exposure of sensitive files and rotate any potentially compromised credentials or keys, especially SSL private keys. Employ monitoring and alerting for unusual file access patterns and conduct regular vulnerability assessments. Finally, segment the network to limit the impact of potential breaches and ensure that sensitive files are stored with strict access controls and encryption at rest.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-05-07T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd8cdb
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/5/2025, 9:25:01 AM
Last updated: 8/13/2025, 11:08:50 AM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.