CVE-2025-53908: CWE-26: Path Traversal: '/dir/../filename' in rommapp romm
RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch.
AI Analysis
Technical Summary
CVE-2025-53908 is a high-severity authenticated path traversal vulnerability affecting RomM, a self-hosted ROM manager and player application. The vulnerability exists in versions prior to 3.10.3 and 4.0.0-beta.3 within the `/api/raw` endpoint. This endpoint improperly validates user-supplied file paths, allowing an authenticated user with limited privileges (such as a kiosk user) to traverse directories using sequences like '/dir/../filename'. Exploiting this flaw enables attackers to access arbitrary files on the server, including sensitive files that may contain stored passwords and user information. The vulnerability does not require user interaction beyond authentication but does require at least low-level privileges. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and privileges required at a low level, with high impact on confidentiality and scope change due to potential leakage of sensitive data. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk to the confidentiality of stored credentials and user data. The issue has been patched in versions 3.10.3 and 4.0.0-beta.3 of RomM, and users are strongly advised to upgrade to these or later versions to mitigate the risk.
Potential Impact
For European organizations using RomM, especially those deploying it in multi-user environments or public kiosks, this vulnerability could lead to unauthorized disclosure of sensitive credentials and user data. This leakage could facilitate further attacks such as privilege escalation, lateral movement, or compromise of other connected systems. Organizations relying on RomM for managing ROM collections or related digital assets may face data breaches impacting user privacy and operational security. The exposure of passwords and user information could also lead to reputational damage and regulatory consequences under GDPR if personal data is involved. Since the vulnerability requires authentication but can be exploited by low-privileged users, insider threats or compromised accounts pose a significant risk. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
European organizations should immediately upgrade RomM installations to version 3.10.3 or 4.0.0-beta.3 or later, where the vulnerability is patched. Additionally, organizations should audit user roles and permissions to ensure minimal necessary privileges are assigned, particularly for kiosk or guest users. Implement strict access controls and monitoring on the `/api/raw` endpoint to detect unusual file access patterns indicative of path traversal attempts. Employ network segmentation to isolate RomM servers from critical infrastructure to limit potential lateral movement. Regularly review and rotate stored credentials and consider encrypting sensitive files at rest to reduce impact if accessed. Finally, maintain up-to-date backups and incident response plans tailored to data leakage scenarios involving internal applications.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
CVE-2025-53908: CWE-26: Path Traversal: '/dir/../filename' in rommapp romm
Description
RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch.
AI-Powered Analysis
Technical Analysis
CVE-2025-53908 is a high-severity authenticated path traversal vulnerability affecting RomM, a self-hosted ROM manager and player application. The vulnerability exists in versions prior to 3.10.3 and 4.0.0-beta.3 within the `/api/raw` endpoint. This endpoint improperly validates user-supplied file paths, allowing an authenticated user with limited privileges (such as a kiosk user) to traverse directories using sequences like '/dir/../filename'. Exploiting this flaw enables attackers to access arbitrary files on the server, including sensitive files that may contain stored passwords and user information. The vulnerability does not require user interaction beyond authentication but does require at least low-level privileges. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and privileges required at a low level, with high impact on confidentiality and scope change due to potential leakage of sensitive data. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk to the confidentiality of stored credentials and user data. The issue has been patched in versions 3.10.3 and 4.0.0-beta.3 of RomM, and users are strongly advised to upgrade to these or later versions to mitigate the risk.
Potential Impact
For European organizations using RomM, especially those deploying it in multi-user environments or public kiosks, this vulnerability could lead to unauthorized disclosure of sensitive credentials and user data. This leakage could facilitate further attacks such as privilege escalation, lateral movement, or compromise of other connected systems. Organizations relying on RomM for managing ROM collections or related digital assets may face data breaches impacting user privacy and operational security. The exposure of passwords and user information could also lead to reputational damage and regulatory consequences under GDPR if personal data is involved. Since the vulnerability requires authentication but can be exploited by low-privileged users, insider threats or compromised accounts pose a significant risk. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
European organizations should immediately upgrade RomM installations to version 3.10.3 or 4.0.0-beta.3 or later, where the vulnerability is patched. Additionally, organizations should audit user roles and permissions to ensure minimal necessary privileges are assigned, particularly for kiosk or guest users. Implement strict access controls and monitoring on the `/api/raw` endpoint to detect unusual file access patterns indicative of path traversal attempts. Employ network segmentation to isolate RomM servers from critical infrastructure to limit potential lateral movement. Regularly review and rotate stored credentials and consider encrypting sensitive files at rest to reduce impact if accessed. Finally, maintain up-to-date backups and incident response plans tailored to data leakage scenarios involving internal applications.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-11T19:05:23.827Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68780519a83201eaacde16d8
Added to database: 7/16/2025, 8:01:29 PM
Last enriched: 7/24/2025, 1:04:02 AM
Last updated: 8/27/2025, 6:42:23 PM
Views: 32
Related Threats
CVE-2025-9695: Improper Export of Android Application Components in GalleryVault Gallery Vault App
MediumCVE-2025-9694: SQL Injection in Campcodes Advanced Online Voting System
MediumCVE-2025-9692: SQL Injection in Campcodes Online Shopping System
MediumCVE-2025-9691: SQL Injection in Campcodes Online Shopping System
MediumCVE-2025-9690: SQL Injection in SourceCodester Advanced School Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.