Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60915: n/a

0
Unknown
VulnerabilityCVE-2025-60915cvecve-2025-60915
Published: Mon Nov 24 2025 (11/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the size query parameter (/views/file.py) of Austrian Archaeological Institute Openatlas before v8.12.0 allows attackers to execute a path traversal via a crafted request.

AI-Powered Analysis

AILast updated: 11/24/2025, 15:44:16 UTC

Technical Analysis

CVE-2025-60915 is a path traversal vulnerability identified in the Openatlas software developed by the Austrian Archaeological Institute, affecting versions prior to 8.12.0. The vulnerability resides in the handling of the 'size' query parameter within the /views/file.py script. An attacker can craft a malicious HTTP request that manipulates this parameter to traverse directories on the server's filesystem, thereby accessing files outside the intended directory scope. This type of vulnerability typically arises from insufficient sanitization or validation of user-supplied input used in file path construction. Successful exploitation allows unauthorized reading of arbitrary files, which may include sensitive configuration files, credentials, or other protected data. There is no indication that authentication is required to exploit this flaw, increasing its risk profile. Although no active exploits have been reported, the vulnerability is publicly disclosed and assigned a CVE identifier. The lack of a CVSS score suggests the need for an independent severity assessment. The vulnerability affects organizations using Openatlas, a software platform used primarily in archaeological research and cultural heritage management, which may contain sensitive or proprietary data. The technical details indicate the vulnerability was reserved in late September 2025 and published in November 2025, with no patch links currently provided, emphasizing the urgency for affected users to seek updates or mitigations from the vendor.

Potential Impact

For European organizations, particularly those involved in archaeological research, cultural heritage preservation, and academic institutions using Openatlas, this vulnerability poses a significant risk. Unauthorized file access can lead to exposure of sensitive research data, personal information, or system configuration files, potentially resulting in data breaches or further system compromise. The confidentiality of proprietary archaeological datasets and personal data of researchers or subjects could be compromised. Additionally, if attackers access system files or credentials, they might escalate privileges or pivot within the network, impacting integrity and availability. Given the specialized nature of Openatlas, the impact is concentrated but critical within this niche sector. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as public disclosure may prompt attackers to develop exploits. European organizations must consider the reputational damage and regulatory implications, such as GDPR violations, if personal or sensitive data is exposed.

Mitigation Recommendations

Organizations should immediately verify their Openatlas version and upgrade to version 8.12.0 or later once available, as this is the primary remediation step. In the absence of an official patch, implement strict input validation and sanitization on the 'size' query parameter to prevent directory traversal characters (e.g., '../'). Employ web application firewalls (WAFs) with rules designed to detect and block path traversal attempts targeting the /views/file.py endpoint. Restrict file system permissions so that the Openatlas application runs with the least privileges necessary, limiting the files accessible to the application user. Conduct thorough logging and monitoring of web server access logs to identify suspicious requests attempting directory traversal patterns. Engage with the vendor or community for interim patches or workarounds. Additionally, review and harden server configurations to prevent unauthorized file access and consider network segmentation to isolate critical research systems. Regularly audit and update security controls to detect exploitation attempts promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69247cb8efc7406fa668b298

Added to database: 11/24/2025, 3:41:44 PM

Last enriched: 11/24/2025, 3:44:16 PM

Last updated: 11/24/2025, 5:26:58 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats