Skip to main content

CVE-2025-47619: CWE-862 Missing Authorization in 6Storage 6Storage Rentals

Medium
VulnerabilityCVE-2025-47619cvecve-2025-47619cwe-862
Published: Fri May 23 2025 (05/23/2025, 12:43:26 UTC)
Source: CVE
Vendor/Project: 6Storage
Product: 6Storage Rentals

Description

Missing Authorization vulnerability in 6Storage 6Storage Rentals allows Path Traversal. This issue affects 6Storage Rentals: from n/a through 2.19.4.

AI-Powered Analysis

AILast updated: 07/08/2025, 22:28:03 UTC

Technical Analysis

CVE-2025-47619 is a Missing Authorization vulnerability (CWE-862) identified in the 6Storage Rentals product by 6Storage, affecting versions up to 2.19.4. The vulnerability allows an attacker with limited privileges (PR:L - privileges required) to perform unauthorized actions due to insufficient authorization checks. Specifically, it enables a path traversal attack, where an attacker can manipulate file paths to access files or directories outside the intended scope. The CVSS 3.1 base score is 6.5 (medium severity), reflecting a network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), but no impact on integrity (I:N) or availability (A:N). This means an attacker with some level of access can exploit the vulnerability remotely to read sensitive files, potentially exposing confidential information without altering or disrupting system operations. The lack of patches or known exploits in the wild suggests the vulnerability is newly disclosed and may not yet be actively exploited. However, the path traversal combined with missing authorization can be leveraged to bypass access controls, leading to significant confidentiality breaches.

Potential Impact

For European organizations using 6Storage Rentals, this vulnerability poses a significant risk to the confidentiality of sensitive data. Unauthorized access to files could expose personal data, financial records, or proprietary business information, potentially violating GDPR and other data protection regulations. The medium severity score indicates that while the vulnerability does not allow data modification or service disruption, the confidentiality breach alone can lead to reputational damage, regulatory fines, and loss of customer trust. Organizations in sectors such as real estate, property management, or rental services that rely on 6Storage Rentals are particularly at risk. The requirement for some level of privileges means insider threats or compromised user accounts could be leveraged to exploit this vulnerability. Given the cross-border nature of many European businesses, data leakage could have cascading effects across multiple jurisdictions.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific actions: 1) Immediately review and restrict user privileges within 6Storage Rentals to the minimum necessary, reducing the risk of exploitation by low-privilege users. 2) Conduct a thorough audit of file access controls and logs to detect any unauthorized access attempts or suspicious activity related to path traversal. 3) Apply any available vendor patches or updates as soon as they are released; if no patch is currently available, consider temporary compensating controls such as web application firewalls (WAFs) configured to detect and block path traversal patterns. 4) Implement strict input validation and sanitization on file path parameters to prevent manipulation. 5) Enhance monitoring and alerting for unusual file access patterns, especially from accounts with limited privileges. 6) Educate users about the risks of credential compromise and enforce strong authentication mechanisms to prevent privilege escalation. 7) Engage with the vendor to obtain timelines for patch releases and request security advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T10:44:40.883Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68306f8e0acd01a24927243b

Added to database: 5/23/2025, 12:52:30 PM

Last enriched: 7/8/2025, 10:28:03 PM

Last updated: 7/30/2025, 4:09:19 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats