CVE-2025-59342: CWE-24: Path Traversal: '../filedir' in esm-dev esm.sh
esm.sh is a nobuild content delivery network(CDN) for modern web development. In 136 and earlier, a path-traversal flaw in the handling of the X-Zone-Id HTTP header allows an attacker to cause the application to write files outside the intended storage location. The header value is used to build a filesystem path but is not properly canonicalized or restricted to the application’s storage base directory. As a result, supplying ../ sequences in X-Zone-Id causes files to be written to arbitrary directories.
CVE-2025-59342: CWE-24: Path Traversal: '../filedir' in esm-dev esm.sh
Description
esm.sh is a nobuild content delivery network(CDN) for modern web development. In 136 and earlier, a path-traversal flaw in the handling of the X-Zone-Id HTTP header allows an attacker to cause the application to write files outside the intended storage location. The header value is used to build a filesystem path but is not properly canonicalized or restricted to the application’s storage base directory. As a result, supplying ../ sequences in X-Zone-Id causes files to be written to arbitrary directories.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-12T12:36:24.636Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68caf94c33b75e972181a55c
Added to database: 9/17/2025, 6:09:16 PM
Last updated: 9/17/2025, 6:09:16 PM
Views: 1
Related Threats
CVE-2025-10607: Information Disclosure in Portabilis i-Educar
MediumCVE-2025-10606: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-59341: CWE-23: Relative Path Traversal in esm-dev esm.sh
HighCVE-2025-10597: SQL Injection in kidaze CourseSelectionSystem
MediumCVE-2025-58767: CWE-400: Uncontrolled Resource Consumption in ruby rexml
LowActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.