Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62511: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in zheny-creator YtGrabber-TUI

0
Medium
VulnerabilityCVE-2025-62511cvecve-2025-62511cwe-367
Published: Fri Oct 17 2025 (10/17/2025, 19:55:34 UTC)
Source: CVE Database V5
Vendor/Project: zheny-creator
Product: YtGrabber-TUI

Description

yt-grabber-tui is a C++ terminal user interface application for downloading YouTube content. yt-grabber-tui version 1.0 contains a Time-of-Check to Time-of-Use (TOCTOU) race condition (CWE-367) in the creation of the default configuration file config.json. In version 1.0, load_json_settings in Settings.hpp checks for the existence of config.json using boost::filesystem::exists and, if the file is missing, calls create_json_settings which writes the JSON configuration with boost::property_tree::write_json. A local attacker with write access to the application’s configuration directory (~/.config/yt-grabber-tui on Linux or the current working directory on Windows) can create a symbolic link between the existence check and the subsequent write so that the write operation follows the symlink and overwrites an attacker-chosen file accessible to the running process. This enables arbitrary file overwrite within the privileges of the application process, which can corrupt files and cause loss of application or user data. If the application is executed with elevated privileges, this could extend to system file corruption. The issue is fixed in version 1.0.1.

AI-Powered Analysis

AILast updated: 10/17/2025, 20:16:57 UTC

Technical Analysis

CVE-2025-62511 identifies a Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in yt-grabber-tui version 1.0, a C++ terminal user interface application designed for downloading YouTube content. The vulnerability is located in the process of creating the default configuration file config.json. Specifically, the function load_json_settings in Settings.hpp first checks for the existence of config.json using boost::filesystem::exists. If the file does not exist, it calls create_json_settings, which writes the JSON configuration file using boost::property_tree::write_json. The race condition arises because between the existence check and the write operation, a local attacker with write access to the configuration directory (~/.config/yt-grabber-tui on Linux or the current working directory on Windows) can create a symbolic link pointing to an arbitrary file. Consequently, when the application writes the configuration, it follows the symlink and overwrites the target file. This arbitrary file overwrite can corrupt application or user data and, if the application runs with elevated privileges, may lead to system file corruption or compromise. Exploitation requires local access with write permissions but no user interaction. The vulnerability has a CVSS 3.1 score of 6.3, reflecting medium severity, with attack vector local, attack complexity high, privileges required low, no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts. The issue is resolved in yt-grabber-tui version 1.0.1.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to users running yt-grabber-tui locally, especially developers or system administrators who may execute the application with elevated privileges. Successful exploitation can lead to arbitrary file overwrites, resulting in corruption or loss of critical configuration files, application data, or even system files if elevated privileges are involved. This can disrupt workflows, cause data loss, and potentially allow further privilege escalation or system compromise. Organizations relying on this tool for content downloading or automation may experience operational disruptions. The impact is more pronounced in environments where multiple users share systems or where directory permissions are not strictly controlled. Since the vulnerability requires local write access, the threat is mainly from insider threats or attackers who have already gained limited access to the system. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation.

Mitigation Recommendations

1. Upgrade yt-grabber-tui to version 1.0.1 or later, where the TOCTOU race condition is fixed. 2. Restrict write permissions on the configuration directories (~/.config/yt-grabber-tui on Linux and the application working directory on Windows) to trusted users only, preventing unauthorized creation of symbolic links or files. 3. Run yt-grabber-tui with the least privileges necessary; avoid executing it with elevated or administrative rights. 4. Implement file system monitoring to detect unexpected symbolic link creations or modifications in configuration directories. 5. Educate users about the risks of running applications with elevated privileges and the importance of securing local directories. 6. Consider using filesystem features or security modules (e.g., SELinux, AppArmor) to enforce stricter controls on configuration file access and modifications. 7. Regularly audit local user permissions and system configurations to minimize the risk of local privilege abuse.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-15T15:03:28.133Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f2a0a79c34d0947f3fb6c3

Added to database: 10/17/2025, 8:01:43 PM

Last enriched: 10/17/2025, 8:16:57 PM

Last updated: 10/18/2025, 8:27:55 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats