Skip to main content

CVE-2025-49089: n/a

Medium
VulnerabilityCVE-2025-49089cvecve-2025-49089
Published: Mon Sep 15 2025 (09/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

wangxutech MoneyPrinterTurbo 1.2.6 allows path traversal via /api/v1/download/ URIs such as /api/v1/download//etc/passwd.

AI-Powered Analysis

AILast updated: 09/15/2025, 17:12:42 UTC

Technical Analysis

CVE-2025-49089 is a path traversal vulnerability identified in wangxutech MoneyPrinterTurbo version 1.2.6. The vulnerability arises from insufficient validation of user-supplied input in the /api/v1/download/ endpoint. Specifically, an attacker can craft a URI such as /api/v1/download//etc/passwd to traverse directories and access arbitrary files on the server's filesystem. This type of vulnerability allows unauthorized reading of sensitive files outside the intended directory scope, potentially exposing critical system files, configuration data, or application secrets. The vulnerability does not require authentication or user interaction, making it easier for remote attackers to exploit. Although no known exploits are currently reported in the wild, the lack of a patch and the straightforward nature of the attack vector pose a significant risk. The absence of a CVSS score limits precise severity quantification, but the technical details indicate a serious security flaw that could compromise confidentiality and integrity of data on affected systems.

Potential Impact

For European organizations using wangxutech MoneyPrinterTurbo 1.2.6, this vulnerability could lead to unauthorized disclosure of sensitive information such as system configuration files, user credentials, or proprietary data stored on the server. This exposure can facilitate further attacks including privilege escalation, lateral movement, or data breaches. Given the potential access to critical files like /etc/passwd, attackers might gain insights into user accounts and system structure, increasing the risk of subsequent exploitation. The impact is particularly severe for organizations handling sensitive personal data under GDPR, as unauthorized data exposure could result in regulatory penalties and reputational damage. Additionally, sectors with high-value intellectual property or critical infrastructure components could face operational disruptions or espionage risks if attackers leverage this vulnerability.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their use of wangxutech MoneyPrinterTurbo and identify any instances of version 1.2.6. If possible, upgrade to a patched version once available. In the absence of an official patch, implement strict input validation and sanitization on the /api/v1/download/ endpoint to prevent directory traversal sequences such as '../' or absolute paths. Employ web application firewalls (WAFs) configured to detect and block path traversal attempts. Restrict file system permissions for the application user to limit access to only necessary directories and files, minimizing the impact of any successful traversal. Conduct thorough security testing, including fuzzing and penetration testing, to identify and remediate similar vulnerabilities. Finally, monitor logs for suspicious access patterns targeting the download API and establish incident response procedures for potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-30T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c848eec2afb2158518cf8a

Added to database: 9/15/2025, 5:12:14 PM

Last enriched: 9/15/2025, 5:12:42 PM

Last updated: 9/15/2025, 6:56:31 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats