CVE-2025-54071: CWE-434: Unrestricted Upload of File with Dangerous Type in rommapp romm
RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. In versions 4.0.0-beta.3 and below, an authenticated arbitrary file write vulnerability exists in the /api/saves endpoint. This can lead to Remote Code Execution on the system. The vulnerability permits arbitrary file write operations, allowing attackers to create or modify files at any filesystem location with user-supplied content. A user with viewer role or Scope.ASSETS_WRITE permission or above is required to pass authentication checks. The vulnerability is fixed in version 4.0.0-beta.4.
AI Analysis
Technical Summary
CVE-2025-54071 is a critical vulnerability identified in the RomM application (ROM Manager), specifically affecting versions prior to 4.0.0-beta.4. RomM is a software tool designed to help users manage their game collections by scanning, enriching, browsing, and playing games through a user-friendly interface. The vulnerability resides in the /api/saves endpoint, where an authenticated user with at least viewer role or Scope.ASSETS_WRITE permission can exploit an arbitrary file write flaw. This flaw allows the attacker to write files with user-supplied content to any location on the filesystem without proper restrictions on file types or paths. The vulnerability is classified under CWE-434, which refers to the unrestricted upload of files with dangerous types. Exploiting this vulnerability can lead to remote code execution (RCE) on the affected system, as attackers can place malicious scripts or executables in critical locations, potentially gaining full control over the system. The CVSS 4.0 base score of 9.4 reflects the high severity, with network attack vector, low attack complexity, no user interaction required, and partial privileges needed (authenticated user with limited permissions). The vulnerability impacts confidentiality, integrity, and availability, with a high scope and impact on all three security properties. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the ease of triggering the vulnerability once authenticated. The issue is resolved in version 4.0.0-beta.4 of RomM, where proper validation and restrictions on file uploads have been implemented to prevent arbitrary file writes.
Potential Impact
For European organizations using RomM to manage game collections, this vulnerability poses a significant risk. If exploited, attackers could execute arbitrary code on systems running vulnerable versions, potentially leading to data breaches, system compromise, or disruption of services. Organizations in gaming, digital entertainment, or any sector relying on RomM for asset management could face operational downtime and loss of data integrity. The requirement for authentication lowers the attack surface but does not eliminate risk, especially in environments where user credentials may be compromised or where insider threats exist. The ability to write files anywhere on the filesystem could allow attackers to implant persistent backdoors, escalate privileges, or disrupt critical system functions. Given the critical CVSS score and the potential for remote code execution, European entities should prioritize patching and monitoring to mitigate risks. The impact extends beyond individual systems to potentially affect networked environments if lateral movement is achieved post-exploitation.
Mitigation Recommendations
1. Immediate upgrade to RomM version 4.0.0-beta.4 or later, where the vulnerability is patched. 2. Restrict access to the /api/saves endpoint by enforcing strict role-based access control and minimizing the number of users with viewer or ASSETS_WRITE permissions. 3. Implement network segmentation and firewall rules to limit access to RomM management interfaces only to trusted internal networks or VPN users. 4. Monitor logs for unusual file write activities or unexpected changes in filesystem locations, especially around the /api/saves endpoint. 5. Employ application-layer security controls such as Web Application Firewalls (WAF) with custom rules to detect and block suspicious file upload patterns. 6. Conduct regular audits of user permissions and authentication mechanisms to prevent credential misuse. 7. Use endpoint detection and response (EDR) tools to identify and respond to potential post-exploitation behaviors such as unauthorized code execution or persistence mechanisms. 8. Educate users with access about the risks of credential sharing and phishing attacks that could lead to compromised accounts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland
CVE-2025-54071: CWE-434: Unrestricted Upload of File with Dangerous Type in rommapp romm
Description
RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. In versions 4.0.0-beta.3 and below, an authenticated arbitrary file write vulnerability exists in the /api/saves endpoint. This can lead to Remote Code Execution on the system. The vulnerability permits arbitrary file write operations, allowing attackers to create or modify files at any filesystem location with user-supplied content. A user with viewer role or Scope.ASSETS_WRITE permission or above is required to pass authentication checks. The vulnerability is fixed in version 4.0.0-beta.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-54071 is a critical vulnerability identified in the RomM application (ROM Manager), specifically affecting versions prior to 4.0.0-beta.4. RomM is a software tool designed to help users manage their game collections by scanning, enriching, browsing, and playing games through a user-friendly interface. The vulnerability resides in the /api/saves endpoint, where an authenticated user with at least viewer role or Scope.ASSETS_WRITE permission can exploit an arbitrary file write flaw. This flaw allows the attacker to write files with user-supplied content to any location on the filesystem without proper restrictions on file types or paths. The vulnerability is classified under CWE-434, which refers to the unrestricted upload of files with dangerous types. Exploiting this vulnerability can lead to remote code execution (RCE) on the affected system, as attackers can place malicious scripts or executables in critical locations, potentially gaining full control over the system. The CVSS 4.0 base score of 9.4 reflects the high severity, with network attack vector, low attack complexity, no user interaction required, and partial privileges needed (authenticated user with limited permissions). The vulnerability impacts confidentiality, integrity, and availability, with a high scope and impact on all three security properties. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the ease of triggering the vulnerability once authenticated. The issue is resolved in version 4.0.0-beta.4 of RomM, where proper validation and restrictions on file uploads have been implemented to prevent arbitrary file writes.
Potential Impact
For European organizations using RomM to manage game collections, this vulnerability poses a significant risk. If exploited, attackers could execute arbitrary code on systems running vulnerable versions, potentially leading to data breaches, system compromise, or disruption of services. Organizations in gaming, digital entertainment, or any sector relying on RomM for asset management could face operational downtime and loss of data integrity. The requirement for authentication lowers the attack surface but does not eliminate risk, especially in environments where user credentials may be compromised or where insider threats exist. The ability to write files anywhere on the filesystem could allow attackers to implant persistent backdoors, escalate privileges, or disrupt critical system functions. Given the critical CVSS score and the potential for remote code execution, European entities should prioritize patching and monitoring to mitigate risks. The impact extends beyond individual systems to potentially affect networked environments if lateral movement is achieved post-exploitation.
Mitigation Recommendations
1. Immediate upgrade to RomM version 4.0.0-beta.4 or later, where the vulnerability is patched. 2. Restrict access to the /api/saves endpoint by enforcing strict role-based access control and minimizing the number of users with viewer or ASSETS_WRITE permissions. 3. Implement network segmentation and firewall rules to limit access to RomM management interfaces only to trusted internal networks or VPN users. 4. Monitor logs for unusual file write activities or unexpected changes in filesystem locations, especially around the /api/saves endpoint. 5. Employ application-layer security controls such as Web Application Firewalls (WAF) with custom rules to detect and block suspicious file upload patterns. 6. Conduct regular audits of user permissions and authentication mechanisms to prevent credential misuse. 7. Use endpoint detection and response (EDR) tools to identify and respond to potential post-exploitation behaviors such as unauthorized code execution or persistence mechanisms. 8. Educate users with access about the risks of credential sharing and phishing attacks that could lead to compromised accounts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-16T13:22:18.205Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687ea00aa83201eaac13ae4f
Added to database: 7/21/2025, 8:16:10 PM
Last enriched: 7/29/2025, 1:18:41 AM
Last updated: 8/25/2025, 9:02:27 AM
Views: 31
Related Threats
CVE-2025-58362: CWE-706: Use of Incorrectly-Resolved Name or Reference in honojs hono
HighCVE-2025-58179: CWE-918: Server-Side Request Forgery (SSRF) in withastro astro
HighCVE-2025-55739: CWE-798: Use of Hard-coded Credentials in FreePBX security-reporting
MediumCVE-2025-58352: CWE-613: Insufficient Session Expiration in WeblateOrg weblate
LowCVE-2025-55244: CWE-284: Improper Access Control in Microsoft Azure Bot Service
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.