Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59342: CWE-24: Path Traversal: '../filedir' in esm-dev esm.sh

0
Medium
VulnerabilityCVE-2025-59342cvecve-2025-59342cwe-24
Published: Wed Sep 17 2025 (09/17/2025, 17:59:34 UTC)
Source: CVE Database V5
Vendor/Project: esm-dev
Product: esm.sh

Description

esm.sh is a nobuild content delivery network(CDN) for modern web development. In 136 and earlier, a path-traversal flaw in the handling of the X-Zone-Id HTTP header allows an attacker to cause the application to write files outside the intended storage location. The header value is used to build a filesystem path but is not properly canonicalized or restricted to the application’s storage base directory. As a result, supplying ../ sequences in X-Zone-Id causes files to be written to arbitrary directories.

AI-Powered Analysis

AILast updated: 09/17/2025, 18:13:02 UTC

Technical Analysis

CVE-2025-59342 is a path traversal vulnerability identified in esm.sh, a no-build content delivery network (CDN) service used for modern web development. The vulnerability affects esm.sh versions up to and including version 136. The root cause lies in the improper handling of the X-Zone-Id HTTP header, which is used by the application to construct filesystem paths for storing files. The application fails to canonicalize or restrict the header's value to the intended storage base directory. Consequently, an attacker can supply directory traversal sequences such as '../' within the X-Zone-Id header, enabling the application to write files outside the designated storage area. This can lead to unauthorized file writes to arbitrary locations on the server's filesystem. The vulnerability has a CVSS 4.0 base score of 5.5, indicating a medium severity level. The attack vector is network-based, requires no privileges, no user interaction, and no authentication, making it relatively easy to exploit remotely. However, the impact on confidentiality and availability is limited, with a low impact on integrity since the vulnerability allows writing files but does not directly enable code execution or data disclosure. No known exploits are currently reported in the wild. The vulnerability is classified under CWE-24 (Improper Restriction of a Pathname to a Restricted Directory).

Potential Impact

For European organizations utilizing esm.sh as part of their web development or content delivery infrastructure, this vulnerability poses a risk of unauthorized file writes on the servers hosting esm.sh or integrated systems. Attackers could potentially write malicious files, overwrite critical configuration files, or place web shells if the server environment executes files from writable directories. This could lead to further compromise, including privilege escalation or persistent access. Although esm.sh is a CDN service, organizations relying on it for critical web assets or internal tooling may face service disruption or data integrity issues. The vulnerability's exploitation could also undermine trust in the supply chain of web development resources. Given the network-exploitable nature and lack of required authentication, attackers can attempt exploitation remotely, increasing the threat surface. European organizations with strict data protection and cybersecurity regulations (e.g., GDPR) may face compliance risks if exploitation leads to data breaches or service outages.

Mitigation Recommendations

1. Immediate upgrade to esm.sh versions later than 136 where the vulnerability is patched, once available. 2. If patching is not immediately possible, implement strict input validation and sanitization on the X-Zone-Id HTTP header to reject any directory traversal sequences such as '../' or absolute paths. 3. Employ filesystem access controls and sandboxing to restrict the application’s write permissions strictly to its designated storage directories, preventing writes to arbitrary locations even if traversal occurs. 4. Monitor server logs for suspicious requests containing traversal patterns in the X-Zone-Id header and unusual file write activities. 5. Use Web Application Firewalls (WAFs) with custom rules to detect and block requests attempting path traversal via headers. 6. Conduct regular security audits and penetration testing focusing on input validation and file system access controls in the deployment environment. 7. Educate development and operations teams about secure handling of user-controlled input in path constructions to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-12T12:36:24.636Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68caf94c33b75e972181a55c

Added to database: 9/17/2025, 6:09:16 PM

Last enriched: 9/17/2025, 6:13:02 PM

Last updated: 10/30/2025, 3:09:48 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats