Skip to main content

CVE-2025-49466: CWE-23 Relative Path Traversal in rjarry aerc

Medium
VulnerabilityCVE-2025-49466cvecve-2025-49466cwe-23
Published: Thu Jun 05 2025 (06/05/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: rjarry
Product: aerc

Description

aerc before 93bec0d allows directory traversal in commands/msgview/open.go because of direct path concatenation of the name of an attachment part,

AI-Powered Analysis

AILast updated: 07/07/2025, 03:25:57 UTC

Technical Analysis

CVE-2025-49466 is a medium severity vulnerability classified as CWE-23, which pertains to relative path traversal. This vulnerability affects the 'aerc' email client developed by rjarry, specifically in versions prior to commit 93bec0d. The issue arises in the commands/msgview/open.go source file, where the application performs direct path concatenation using the name of an attachment part without proper sanitization or validation. This flaw allows an attacker to craft a malicious attachment name containing relative path sequences (e.g., '../'), enabling directory traversal beyond the intended directory boundaries. Consequently, an attacker could potentially access or manipulate files outside the designated attachment directory. The CVSS v3.1 base score is 5.8, indicating a medium severity level. The vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N shows that the vulnerability is remotely exploitable over the network without any privileges or user interaction, with a scope change (S:C) meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is limited to integrity (I:L) with no direct confidentiality or availability impact. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting that remediation may still be pending or in progress. The vulnerability's root cause is insufficient input validation and unsafe file path handling in the attachment opening functionality, which is a common security weakness in software that handles file system operations based on user input.

Potential Impact

For European organizations using the 'aerc' email client, this vulnerability presents a moderate risk. Since 'aerc' is an email client, it is often used by individuals and organizations for managing email communications, including attachments. Exploitation could allow attackers to manipulate or overwrite files on the victim's system by leveraging crafted attachment names, potentially leading to unauthorized modification of local files, which could be leveraged for further attacks such as privilege escalation or persistence. Although the vulnerability does not directly compromise confidentiality or availability, the integrity impact could disrupt normal operations or corrupt critical files. The fact that no user interaction or privileges are required for exploitation increases the risk, especially in environments where 'aerc' is used to open emails from untrusted sources. European organizations with sensitive data or regulatory requirements (e.g., GDPR) may face compliance risks if such integrity violations lead to data tampering or operational disruptions. However, the lack of known exploits in the wild and the medium severity score suggest that immediate widespread impact is limited but should not be ignored.

Mitigation Recommendations

To mitigate CVE-2025-49466, European organizations using 'aerc' should: 1) Monitor for and promptly apply official patches or updates from the rjarry project once available, as no patch links are currently provided. 2) Until patched, restrict the use of 'aerc' to trusted email sources and avoid opening attachments from unverified or suspicious senders. 3) Implement application-level sandboxing or run 'aerc' in a restricted environment (e.g., containerization or limited user permissions) to minimize potential damage from file system manipulation. 4) Employ endpoint detection and response (EDR) tools to monitor for unusual file system activities that could indicate exploitation attempts. 5) Educate users about the risks of opening attachments with suspicious names or from unknown sources. 6) Review and harden file system permissions to prevent unauthorized file modifications by user-level processes. 7) Consider alternative email clients with a stronger security track record if timely patching is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684107ee182aa0cae2cade2b

Added to database: 6/5/2025, 2:58:54 AM

Last enriched: 7/7/2025, 3:25:57 AM

Last updated: 8/18/2025, 11:30:00 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats