Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-51661: n/a

0
High
VulnerabilityCVE-2025-51661cvecve-2025-51661
Published: Wed Nov 19 2025 (11/19/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A path Traversal vulnerability found in FileCodeBox v2.2 and earlier allows arbitrary file writes when application is configured to use local filesystem storage. SystemFileStorage.save_file method in core/storage.py uses filenames from user input without validation to construct save_path and save files. This allows remote attackers to perform arbitrary file writes outside the intended directory by sending crafted POST requests with malicious traversal sequences to /share/file/ upload endpoint, which does not require any authorization.

AI-Powered Analysis

AILast updated: 11/26/2025, 21:05:30 UTC

Technical Analysis

CVE-2025-51661 is a path traversal vulnerability identified in FileCodeBox versions 2.2 and earlier. The root cause lies in the SystemFileStorage.save_file method within core/storage.py, which constructs the file save path using filenames directly from user input without any validation or sanitization. This flaw allows remote attackers to craft POST requests containing malicious directory traversal sequences (e.g., '../') targeting the /share/file/ upload endpoint. Because this endpoint does not require any form of authorization, attackers can exploit it to write arbitrary files anywhere on the local filesystem accessible by the application process. This can lead to overwriting critical system or application files, potentially exposing sensitive data or enabling further compromise. The vulnerability is classified under CWE-24 (Improper Restriction of File Name in a File Path) and carries a CVSS v3.1 base score of 7.5, indicating high severity. The attack vector is network-based with no privileges or user interaction required, making exploitation straightforward once the system is exposed. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date (November 19, 2025).

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality and system integrity. Since the vulnerability allows arbitrary file writes without authentication, attackers can overwrite configuration files, inject malicious scripts, or replace legitimate files with malicious ones, potentially leading to data breaches or system compromise. Organizations using FileCodeBox with local filesystem storage are particularly vulnerable. Critical sectors such as finance, healthcare, government, and industrial control systems could face operational disruptions or data leaks if exploited. The lack of authentication and ease of exploitation increase the likelihood of attacks, especially in environments where the application is exposed to the internet. Additionally, the ability to write files arbitrarily could be leveraged to establish persistent footholds or pivot within networks, escalating the threat beyond initial exploitation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement strict input validation and sanitization on all filenames received via the /share/file/ upload endpoint. Specifically, reject or canonicalize any path traversal sequences such as '../' or absolute paths. Employ allowlists for acceptable filenames and enforce saving files strictly within designated directories using secure path resolution methods. If possible, disable local filesystem storage in favor of safer storage backends. Restrict network access to the upload endpoint using firewalls or access control lists to limit exposure. Monitor logs for suspicious upload activity and implement anomaly detection to identify exploitation attempts. Apply principle of least privilege to the application process to minimize filesystem access rights. Stay alert for official patches or updates from FileCodeBox developers and apply them promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691e248d4d0ffcb40bb0867e

Added to database: 11/19/2025, 8:11:57 PM

Last enriched: 11/26/2025, 9:05:30 PM

Last updated: 1/7/2026, 4:48:51 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats