Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49089: n/a

0
Medium
VulnerabilityCVE-2025-49089cvecve-2025-49089
Published: Mon Sep 15 2025 (09/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

wangxutech MoneyPrinterTurbo 1.2.6 allows path traversal via /api/v1/download/ URIs such as /api/v1/download//etc/passwd.

AI-Powered Analysis

AILast updated: 09/15/2025, 17:12:42 UTC

Technical Analysis

CVE-2025-49089 is a path traversal vulnerability identified in wangxutech MoneyPrinterTurbo version 1.2.6. The vulnerability arises from insufficient validation of user-supplied input in the /api/v1/download/ endpoint. Specifically, an attacker can craft a URI such as /api/v1/download//etc/passwd to traverse directories and access arbitrary files on the server's filesystem. This type of vulnerability allows unauthorized reading of sensitive files outside the intended directory scope, potentially exposing critical system files, configuration data, or application secrets. The vulnerability does not require authentication or user interaction, making it easier for remote attackers to exploit. Although no known exploits are currently reported in the wild, the lack of a patch and the straightforward nature of the attack vector pose a significant risk. The absence of a CVSS score limits precise severity quantification, but the technical details indicate a serious security flaw that could compromise confidentiality and integrity of data on affected systems.

Potential Impact

For European organizations using wangxutech MoneyPrinterTurbo 1.2.6, this vulnerability could lead to unauthorized disclosure of sensitive information such as system configuration files, user credentials, or proprietary data stored on the server. This exposure can facilitate further attacks including privilege escalation, lateral movement, or data breaches. Given the potential access to critical files like /etc/passwd, attackers might gain insights into user accounts and system structure, increasing the risk of subsequent exploitation. The impact is particularly severe for organizations handling sensitive personal data under GDPR, as unauthorized data exposure could result in regulatory penalties and reputational damage. Additionally, sectors with high-value intellectual property or critical infrastructure components could face operational disruptions or espionage risks if attackers leverage this vulnerability.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their use of wangxutech MoneyPrinterTurbo and identify any instances of version 1.2.6. If possible, upgrade to a patched version once available. In the absence of an official patch, implement strict input validation and sanitization on the /api/v1/download/ endpoint to prevent directory traversal sequences such as '../' or absolute paths. Employ web application firewalls (WAFs) configured to detect and block path traversal attempts. Restrict file system permissions for the application user to limit access to only necessary directories and files, minimizing the impact of any successful traversal. Conduct thorough security testing, including fuzzing and penetration testing, to identify and remediate similar vulnerabilities. Finally, monitor logs for suspicious access patterns targeting the download API and establish incident response procedures for potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-30T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c848eec2afb2158518cf8a

Added to database: 9/15/2025, 5:12:14 PM

Last enriched: 9/15/2025, 5:12:42 PM

Last updated: 10/30/2025, 12:48:54 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats