Skip to main content

CVE-2025-54071: CWE-434: Unrestricted Upload of File with Dangerous Type in rommapp romm

Critical
VulnerabilityCVE-2025-54071cvecve-2025-54071cwe-434
Published: Mon Jul 21 2025 (07/21/2025, 20:09:17 UTC)
Source: CVE Database V5
Vendor/Project: rommapp
Product: romm

Description

RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. In versions 4.0.0-beta.3 and below, an authenticated arbitrary file write vulnerability exists in the /api/saves endpoint. This can lead to Remote Code Execution on the system. The vulnerability permits arbitrary file write operations, allowing attackers to create or modify files at any filesystem location with user-supplied content. A user with viewer role or Scope.ASSETS_WRITE permission or above is required to pass authentication checks. The vulnerability is fixed in version 4.0.0-beta.4.

AI-Powered Analysis

AILast updated: 07/21/2025, 20:31:12 UTC

Technical Analysis

CVE-2025-54071 is a critical vulnerability identified in the RomM (ROM Manager) application, specifically in versions prior to 4.0.0-beta.4. RomM is a software tool designed to help users manage their game collections by scanning, enriching, browsing, and playing games through a user-friendly interface. The vulnerability exists in the /api/saves endpoint, where an authenticated user with at least viewer role or Scope.ASSETS_WRITE permission can exploit an arbitrary file write flaw. This flaw allows the attacker to write files with user-supplied content to any location on the filesystem without restriction. The core issue is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. Exploiting this vulnerability can lead to remote code execution (RCE) on the affected system, as attackers can place malicious files or scripts that the system may execute. The CVSS 4.0 base score is 9.4, indicating a critical severity level. The vector metrics highlight that the attack requires network access, low attack complexity, no user interaction, and only low privileges (authenticated user with viewer or higher role). The vulnerability impacts confidentiality, integrity, and availability at a high level, with a wide scope affecting all installations of RomM versions below 4.0.0-beta.4. Although no known exploits are currently reported in the wild, the potential for exploitation is significant due to the ease of triggering the vulnerability once authenticated. The issue was publicly disclosed on July 21, 2025, and fixed in version 4.0.0-beta.4.

Potential Impact

For European organizations using RomM to manage game collections, this vulnerability poses a severe risk. An attacker with minimal privileges can gain the ability to write arbitrary files anywhere on the system, potentially leading to full system compromise via remote code execution. This could result in unauthorized access to sensitive data, disruption of services, or use of compromised systems as pivot points for further attacks within the network. Organizations in sectors such as gaming, digital entertainment, and software development that rely on RomM for asset management are particularly vulnerable. The impact extends to both confidentiality and integrity of data, as well as availability if attackers deploy ransomware or destructive payloads. Given the authenticated nature of the exploit, insider threats or compromised user accounts increase risk. Additionally, the lack of user interaction requirement facilitates automated exploitation once credentials are obtained. The vulnerability's critical severity and broad scope necessitate urgent remediation to prevent potential breaches and operational disruptions.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade RomM installations to version 4.0.0-beta.4 or later, where the issue is patched. Until the upgrade is possible, organizations should enforce strict access controls to limit the number of users with viewer or Scope.ASSETS_WRITE permissions, ideally restricting these roles to trusted personnel only. Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Monitoring and logging access to the /api/saves endpoint should be enhanced to detect unusual file write activities. Network segmentation can limit the exposure of RomM servers to only necessary internal users. Additionally, applying application-level input validation and file type restrictions can help prevent malicious file uploads. Regularly auditing user roles and permissions will reduce the attack surface. Finally, organizations should prepare incident response plans to quickly address any signs of exploitation, including forensic analysis and system restoration procedures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-16T13:22:18.205Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687ea00aa83201eaac13ae4f

Added to database: 7/21/2025, 8:16:10 PM

Last enriched: 7/21/2025, 8:31:12 PM

Last updated: 7/21/2025, 8:32:34 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats