CVE-2025-47619: CWE-862 Missing Authorization in 6Storage 6Storage Rentals
Missing Authorization vulnerability in 6Storage 6Storage Rentals allows Path Traversal. This issue affects 6Storage Rentals: from n/a through 2.19.4.
AI Analysis
Technical Summary
CVE-2025-47619 is a Missing Authorization vulnerability (CWE-862) identified in the 6Storage Rentals product by 6Storage, affecting versions up to 2.19.4. The vulnerability allows an attacker with limited privileges (PR:L - privileges required) to perform unauthorized actions due to insufficient authorization checks. Specifically, it enables a path traversal attack, where an attacker can manipulate file paths to access files or directories outside the intended scope. The CVSS 3.1 base score is 6.5 (medium severity), reflecting a network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), but no impact on integrity (I:N) or availability (A:N). This means an attacker with some level of access can exploit the vulnerability remotely to read sensitive files, potentially exposing confidential information without altering or disrupting system operations. The lack of patches or known exploits in the wild suggests the vulnerability is newly disclosed and may not yet be actively exploited. However, the path traversal combined with missing authorization can be leveraged to bypass access controls, leading to significant confidentiality breaches.
Potential Impact
For European organizations using 6Storage Rentals, this vulnerability poses a significant risk to the confidentiality of sensitive data. Unauthorized access to files could expose personal data, financial records, or proprietary business information, potentially violating GDPR and other data protection regulations. The medium severity score indicates that while the vulnerability does not allow data modification or service disruption, the confidentiality breach alone can lead to reputational damage, regulatory fines, and loss of customer trust. Organizations in sectors such as real estate, property management, or rental services that rely on 6Storage Rentals are particularly at risk. The requirement for some level of privileges means insider threats or compromised user accounts could be leveraged to exploit this vulnerability. Given the cross-border nature of many European businesses, data leakage could have cascading effects across multiple jurisdictions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific actions: 1) Immediately review and restrict user privileges within 6Storage Rentals to the minimum necessary, reducing the risk of exploitation by low-privilege users. 2) Conduct a thorough audit of file access controls and logs to detect any unauthorized access attempts or suspicious activity related to path traversal. 3) Apply any available vendor patches or updates as soon as they are released; if no patch is currently available, consider temporary compensating controls such as web application firewalls (WAFs) configured to detect and block path traversal patterns. 4) Implement strict input validation and sanitization on file path parameters to prevent manipulation. 5) Enhance monitoring and alerting for unusual file access patterns, especially from accounts with limited privileges. 6) Educate users about the risks of credential compromise and enforce strong authentication mechanisms to prevent privilege escalation. 7) Engage with the vendor to obtain timelines for patch releases and request security advisories.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-47619: CWE-862 Missing Authorization in 6Storage 6Storage Rentals
Description
Missing Authorization vulnerability in 6Storage 6Storage Rentals allows Path Traversal. This issue affects 6Storage Rentals: from n/a through 2.19.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-47619 is a Missing Authorization vulnerability (CWE-862) identified in the 6Storage Rentals product by 6Storage, affecting versions up to 2.19.4. The vulnerability allows an attacker with limited privileges (PR:L - privileges required) to perform unauthorized actions due to insufficient authorization checks. Specifically, it enables a path traversal attack, where an attacker can manipulate file paths to access files or directories outside the intended scope. The CVSS 3.1 base score is 6.5 (medium severity), reflecting a network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), but no impact on integrity (I:N) or availability (A:N). This means an attacker with some level of access can exploit the vulnerability remotely to read sensitive files, potentially exposing confidential information without altering or disrupting system operations. The lack of patches or known exploits in the wild suggests the vulnerability is newly disclosed and may not yet be actively exploited. However, the path traversal combined with missing authorization can be leveraged to bypass access controls, leading to significant confidentiality breaches.
Potential Impact
For European organizations using 6Storage Rentals, this vulnerability poses a significant risk to the confidentiality of sensitive data. Unauthorized access to files could expose personal data, financial records, or proprietary business information, potentially violating GDPR and other data protection regulations. The medium severity score indicates that while the vulnerability does not allow data modification or service disruption, the confidentiality breach alone can lead to reputational damage, regulatory fines, and loss of customer trust. Organizations in sectors such as real estate, property management, or rental services that rely on 6Storage Rentals are particularly at risk. The requirement for some level of privileges means insider threats or compromised user accounts could be leveraged to exploit this vulnerability. Given the cross-border nature of many European businesses, data leakage could have cascading effects across multiple jurisdictions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific actions: 1) Immediately review and restrict user privileges within 6Storage Rentals to the minimum necessary, reducing the risk of exploitation by low-privilege users. 2) Conduct a thorough audit of file access controls and logs to detect any unauthorized access attempts or suspicious activity related to path traversal. 3) Apply any available vendor patches or updates as soon as they are released; if no patch is currently available, consider temporary compensating controls such as web application firewalls (WAFs) configured to detect and block path traversal patterns. 4) Implement strict input validation and sanitization on file path parameters to prevent manipulation. 5) Enhance monitoring and alerting for unusual file access patterns, especially from accounts with limited privileges. 6) Educate users about the risks of credential compromise and enforce strong authentication mechanisms to prevent privilege escalation. 7) Engage with the vendor to obtain timelines for patch releases and request security advisories.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T10:44:40.883Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68306f8e0acd01a24927243b
Added to database: 5/23/2025, 12:52:30 PM
Last enriched: 7/8/2025, 10:28:03 PM
Last updated: 7/30/2025, 4:09:19 PM
Views: 11
Related Threats
CVE-2025-35970: Use of weak credentials in SEIKO EPSON Multiple EPSON product
HighCVE-2025-29866: CWE-73: External Control of File Name or Path in TAGFREE X-Free Uploader
HighCVE-2025-32094: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Akamai AkamaiGhost
MediumCVE-2025-8583: Inappropriate implementation in Google Chrome
MediumCVE-2025-8582: Insufficient validation of untrusted input in Google Chrome
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.