CVE-2025-62511: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in zheny-creator YtGrabber-TUI
yt-grabber-tui is a C++ terminal user interface application for downloading YouTube content. yt-grabber-tui version 1.0 contains a Time-of-Check to Time-of-Use (TOCTOU) race condition (CWE-367) in the creation of the default configuration file config.json. In version 1.0, load_json_settings in Settings.hpp checks for the existence of config.json using boost::filesystem::exists and, if the file is missing, calls create_json_settings which writes the JSON configuration with boost::property_tree::write_json. A local attacker with write access to the application’s configuration directory (~/.config/yt-grabber-tui on Linux or the current working directory on Windows) can create a symbolic link between the existence check and the subsequent write so that the write operation follows the symlink and overwrites an attacker-chosen file accessible to the running process. This enables arbitrary file overwrite within the privileges of the application process, which can corrupt files and cause loss of application or user data. If the application is executed with elevated privileges, this could extend to system file corruption. The issue is fixed in version 1.0.1.
AI Analysis
Technical Summary
CVE-2025-62511 identifies a Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in yt-grabber-tui version 1.0, a C++ terminal user interface application designed for downloading YouTube content. The vulnerability is located in the process of creating the default configuration file config.json. Specifically, the function load_json_settings in Settings.hpp first checks for the existence of config.json using boost::filesystem::exists. If the file does not exist, it calls create_json_settings, which writes the JSON configuration file using boost::property_tree::write_json. The race condition arises because between the existence check and the write operation, a local attacker with write access to the configuration directory (~/.config/yt-grabber-tui on Linux or the current working directory on Windows) can create a symbolic link pointing to an arbitrary file. Consequently, when the application writes the configuration, it follows the symlink and overwrites the target file. This arbitrary file overwrite can corrupt application or user data and, if the application runs with elevated privileges, may lead to system file corruption or compromise. Exploitation requires local access with write permissions but no user interaction. The vulnerability has a CVSS 3.1 score of 6.3, reflecting medium severity, with attack vector local, attack complexity high, privileges required low, no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts. The issue is resolved in yt-grabber-tui version 1.0.1.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to users running yt-grabber-tui locally, especially developers or system administrators who may execute the application with elevated privileges. Successful exploitation can lead to arbitrary file overwrites, resulting in corruption or loss of critical configuration files, application data, or even system files if elevated privileges are involved. This can disrupt workflows, cause data loss, and potentially allow further privilege escalation or system compromise. Organizations relying on this tool for content downloading or automation may experience operational disruptions. The impact is more pronounced in environments where multiple users share systems or where directory permissions are not strictly controlled. Since the vulnerability requires local write access, the threat is mainly from insider threats or attackers who have already gained limited access to the system. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation.
Mitigation Recommendations
1. Upgrade yt-grabber-tui to version 1.0.1 or later, where the TOCTOU race condition is fixed. 2. Restrict write permissions on the configuration directories (~/.config/yt-grabber-tui on Linux and the application working directory on Windows) to trusted users only, preventing unauthorized creation of symbolic links or files. 3. Run yt-grabber-tui with the least privileges necessary; avoid executing it with elevated or administrative rights. 4. Implement file system monitoring to detect unexpected symbolic link creations or modifications in configuration directories. 5. Educate users about the risks of running applications with elevated privileges and the importance of securing local directories. 6. Consider using filesystem features or security modules (e.g., SELinux, AppArmor) to enforce stricter controls on configuration file access and modifications. 7. Regularly audit local user permissions and system configurations to minimize the risk of local privilege abuse.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-62511: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in zheny-creator YtGrabber-TUI
Description
yt-grabber-tui is a C++ terminal user interface application for downloading YouTube content. yt-grabber-tui version 1.0 contains a Time-of-Check to Time-of-Use (TOCTOU) race condition (CWE-367) in the creation of the default configuration file config.json. In version 1.0, load_json_settings in Settings.hpp checks for the existence of config.json using boost::filesystem::exists and, if the file is missing, calls create_json_settings which writes the JSON configuration with boost::property_tree::write_json. A local attacker with write access to the application’s configuration directory (~/.config/yt-grabber-tui on Linux or the current working directory on Windows) can create a symbolic link between the existence check and the subsequent write so that the write operation follows the symlink and overwrites an attacker-chosen file accessible to the running process. This enables arbitrary file overwrite within the privileges of the application process, which can corrupt files and cause loss of application or user data. If the application is executed with elevated privileges, this could extend to system file corruption. The issue is fixed in version 1.0.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-62511 identifies a Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in yt-grabber-tui version 1.0, a C++ terminal user interface application designed for downloading YouTube content. The vulnerability is located in the process of creating the default configuration file config.json. Specifically, the function load_json_settings in Settings.hpp first checks for the existence of config.json using boost::filesystem::exists. If the file does not exist, it calls create_json_settings, which writes the JSON configuration file using boost::property_tree::write_json. The race condition arises because between the existence check and the write operation, a local attacker with write access to the configuration directory (~/.config/yt-grabber-tui on Linux or the current working directory on Windows) can create a symbolic link pointing to an arbitrary file. Consequently, when the application writes the configuration, it follows the symlink and overwrites the target file. This arbitrary file overwrite can corrupt application or user data and, if the application runs with elevated privileges, may lead to system file corruption or compromise. Exploitation requires local access with write permissions but no user interaction. The vulnerability has a CVSS 3.1 score of 6.3, reflecting medium severity, with attack vector local, attack complexity high, privileges required low, no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts. The issue is resolved in yt-grabber-tui version 1.0.1.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to users running yt-grabber-tui locally, especially developers or system administrators who may execute the application with elevated privileges. Successful exploitation can lead to arbitrary file overwrites, resulting in corruption or loss of critical configuration files, application data, or even system files if elevated privileges are involved. This can disrupt workflows, cause data loss, and potentially allow further privilege escalation or system compromise. Organizations relying on this tool for content downloading or automation may experience operational disruptions. The impact is more pronounced in environments where multiple users share systems or where directory permissions are not strictly controlled. Since the vulnerability requires local write access, the threat is mainly from insider threats or attackers who have already gained limited access to the system. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation.
Mitigation Recommendations
1. Upgrade yt-grabber-tui to version 1.0.1 or later, where the TOCTOU race condition is fixed. 2. Restrict write permissions on the configuration directories (~/.config/yt-grabber-tui on Linux and the application working directory on Windows) to trusted users only, preventing unauthorized creation of symbolic links or files. 3. Run yt-grabber-tui with the least privileges necessary; avoid executing it with elevated or administrative rights. 4. Implement file system monitoring to detect unexpected symbolic link creations or modifications in configuration directories. 5. Educate users about the risks of running applications with elevated privileges and the importance of securing local directories. 6. Consider using filesystem features or security modules (e.g., SELinux, AppArmor) to enforce stricter controls on configuration file access and modifications. 7. Regularly audit local user permissions and system configurations to minimize the risk of local privilege abuse.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-15T15:03:28.133Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f2a0a79c34d0947f3fb6c3
Added to database: 10/17/2025, 8:01:43 PM
Last enriched: 10/17/2025, 8:16:57 PM
Last updated: 10/18/2025, 8:27:55 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownCVE-2025-11926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdreams Related Posts Lite
MediumCVE-2025-9890: CWE-352 Cross-Site Request Forgery (CSRF) in mndpsingh287 Theme Editor
HighCVE-2025-5555: Stack-based Buffer Overflow in Nixdorf Wincor PORT IO Driver
HighCVE-2025-11256: CWE-285 Improper Authorization in kognetiks Kognetiks Chatbot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.