Skip to main content

CVE-2025-53908: CWE-26: Path Traversal: '/dir/../filename' in rommapp romm

High
VulnerabilityCVE-2025-53908cvecve-2025-53908cwe-26
Published: Wed Jul 16 2025 (07/16/2025, 19:55:15 UTC)
Source: CVE Database V5
Vendor/Project: rommapp
Product: romm

Description

RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch.

AI-Powered Analysis

AILast updated: 07/16/2025, 20:16:10 UTC

Technical Analysis

CVE-2025-53908 is a high-severity authenticated path traversal vulnerability affecting the RomM application, a self-hosted ROM manager and player. The vulnerability exists in versions prior to 3.10.3 and 4.0.0-beta.3 within the `/api/raw` endpoint. RomM allows multiple users, including unprivileged ones such as the kiosk user, to interact with the system. Due to insufficient validation of file path inputs, an attacker with authenticated access and at least limited privileges can exploit the path traversal flaw by submitting specially crafted requests containing sequences like '/dir/../filename'. This enables unauthorized access to files outside the intended directory scope. Critically, this can lead to leakage of sensitive data such as stored passwords and user information residing on the system. The vulnerability is rated with a CVSS 4.0 score of 8.3 (high), reflecting its network attack vector, low attack complexity, no user interaction, and partial privileges required. The scope is high, indicating that the vulnerability can affect resources beyond the initially compromised component. Although no known exploits are currently reported in the wild, the presence of sensitive data exposure and ease of exploitation under authenticated conditions make this a significant threat. The vendor has addressed the issue in versions 3.10.3 and 4.0.0-beta.3 by patching the path traversal flaw. Organizations running vulnerable versions should prioritize upgrading to these fixed releases to prevent potential data breaches and unauthorized access.

Potential Impact

For European organizations using RomM, this vulnerability poses a substantial risk to confidentiality and integrity of sensitive data. Given RomM’s role in managing ROM files and user credentials, exploitation could lead to unauthorized disclosure of passwords and user information, potentially enabling further lateral movement or privilege escalation within the affected environment. This is particularly concerning for organizations that deploy RomM in multi-user environments or public-facing kiosks, where unprivileged users might be able to exploit the flaw. Data leakage incidents could result in regulatory non-compliance under GDPR, leading to legal penalties and reputational damage. Additionally, compromised credentials might facilitate broader attacks on internal systems. The network-based attack vector means that attackers do not need physical access, increasing the threat surface. Although exploitation requires authentication with at least limited privileges, the presence of low-privilege users such as kiosks means that the barrier to exploitation is relatively low. Therefore, European entities relying on RomM for digital asset management should consider this vulnerability a critical security concern.

Mitigation Recommendations

1. Immediate upgrade to RomM versions 3.10.3 or 4.0.0-beta.3, which contain patches for this vulnerability, is the most effective mitigation. 2. Restrict access to the `/api/raw` endpoint to only trusted and necessary users, employing network segmentation and firewall rules to limit exposure. 3. Implement strict user privilege management, ensuring that unprivileged users have minimal access rights and cannot authenticate to sensitive API endpoints. 4. Conduct regular audits of user accounts and permissions within RomM to detect any unauthorized or anomalous access patterns. 5. Monitor application logs for unusual file access requests that include path traversal patterns such as '../'. 6. If upgrading immediately is not feasible, consider deploying web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the `/api/raw` endpoint. 7. Educate administrators and users about the risks of path traversal vulnerabilities and enforce strong authentication mechanisms to reduce the risk of credential compromise. 8. Review and secure storage of sensitive data within RomM to minimize impact if unauthorized access occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-11T19:05:23.827Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68780519a83201eaacde16d8

Added to database: 7/16/2025, 8:01:29 PM

Last enriched: 7/16/2025, 8:16:10 PM

Last updated: 7/17/2025, 1:35:46 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats