CVE-2025-64184: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in webcomics dosage
Dosage is a comic strip downloader and archiver. When downloading comic images in versions 3.1 and below, Dosage constructs target file names from different aspects of the remote comic (page URL, image URL, page content, etc.). While the basename is properly stripped of directory-traversing characters, the file extension is taken from the HTTP Content-Type header. This allows a remote attacker (or a Man-in-the-Middle, if the comic is served over HTTP) to write arbitrary files outside the target directory (if additional conditions are met). This issue is fixed in version 3.2.
AI Analysis
Technical Summary
CVE-2025-64184 is a path traversal vulnerability classified under CWE-22, affecting Dosage versions 3.1 and below. Dosage downloads comic strips and archives them by constructing filenames based on various attributes of the remote comic, including the page URL, image URL, and page content. While the software correctly sanitizes the basename of the file to remove directory traversal characters (e.g., '..'), it relies on the HTTP Content-Type header to determine the file extension without validation. This flaw allows an attacker who can control or intercept the HTTP response (either remotely or via man-in-the-middle attacks on unencrypted HTTP connections) to specify a crafted Content-Type header that includes directory traversal sequences or otherwise manipulates the file extension. Consequently, the attacker can cause Dosage to write files outside the intended directory, potentially overwriting critical files or placing malicious files on the victim's system. The vulnerability has a CVSS 3.1 score of 8.8 (high), reflecting its network attack vector, low attack complexity, no required privileges, but requiring user interaction. The impact includes full compromise of confidentiality, integrity, and availability of affected systems. The issue is resolved in Dosage version 3.2, which properly validates and restricts file extensions derived from HTTP headers. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk, especially where unencrypted HTTP is used or where attackers can intercept traffic.
Potential Impact
For European organizations, this vulnerability poses a significant risk, particularly for those using Dosage in environments where comic content is downloaded regularly. The ability to write arbitrary files outside the intended directory can lead to unauthorized code execution, data corruption, or system compromise. Confidential information could be exposed or altered, and critical system files could be overwritten, leading to denial of service or persistent malware installation. Organizations relying on Dosage for digital content management, media archiving, or research may face operational disruptions. The risk is heightened in environments where network traffic is not encrypted, allowing man-in-the-middle attackers to exploit the flaw remotely. Additionally, the vulnerability could be leveraged as a foothold in broader attacks targeting media companies, educational institutions, or cultural organizations that use such tools. The lack of authentication and low complexity of exploitation further increase the threat level.
Mitigation Recommendations
European organizations should immediately upgrade Dosage to version 3.2 or later, where this vulnerability is fixed. If upgrading is not immediately feasible, users should avoid downloading comics over unencrypted HTTP connections to prevent man-in-the-middle exploitation. Network defenses should be enhanced to detect and block suspicious HTTP traffic that attempts to manipulate Content-Type headers. Implement strict egress and ingress filtering to limit exposure to untrusted networks. Additionally, running Dosage with least privilege file system permissions can reduce the impact of arbitrary file writes. Monitoring file system changes in directories used by Dosage can help detect exploitation attempts. Organizations should also educate users about the risks of downloading content from untrusted sources and encourage the use of secure protocols (HTTPS). Regular vulnerability scanning and patch management processes should be enforced to prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2025-64184: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in webcomics dosage
Description
Dosage is a comic strip downloader and archiver. When downloading comic images in versions 3.1 and below, Dosage constructs target file names from different aspects of the remote comic (page URL, image URL, page content, etc.). While the basename is properly stripped of directory-traversing characters, the file extension is taken from the HTTP Content-Type header. This allows a remote attacker (or a Man-in-the-Middle, if the comic is served over HTTP) to write arbitrary files outside the target directory (if additional conditions are met). This issue is fixed in version 3.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-64184 is a path traversal vulnerability classified under CWE-22, affecting Dosage versions 3.1 and below. Dosage downloads comic strips and archives them by constructing filenames based on various attributes of the remote comic, including the page URL, image URL, and page content. While the software correctly sanitizes the basename of the file to remove directory traversal characters (e.g., '..'), it relies on the HTTP Content-Type header to determine the file extension without validation. This flaw allows an attacker who can control or intercept the HTTP response (either remotely or via man-in-the-middle attacks on unencrypted HTTP connections) to specify a crafted Content-Type header that includes directory traversal sequences or otherwise manipulates the file extension. Consequently, the attacker can cause Dosage to write files outside the intended directory, potentially overwriting critical files or placing malicious files on the victim's system. The vulnerability has a CVSS 3.1 score of 8.8 (high), reflecting its network attack vector, low attack complexity, no required privileges, but requiring user interaction. The impact includes full compromise of confidentiality, integrity, and availability of affected systems. The issue is resolved in Dosage version 3.2, which properly validates and restricts file extensions derived from HTTP headers. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk, especially where unencrypted HTTP is used or where attackers can intercept traffic.
Potential Impact
For European organizations, this vulnerability poses a significant risk, particularly for those using Dosage in environments where comic content is downloaded regularly. The ability to write arbitrary files outside the intended directory can lead to unauthorized code execution, data corruption, or system compromise. Confidential information could be exposed or altered, and critical system files could be overwritten, leading to denial of service or persistent malware installation. Organizations relying on Dosage for digital content management, media archiving, or research may face operational disruptions. The risk is heightened in environments where network traffic is not encrypted, allowing man-in-the-middle attackers to exploit the flaw remotely. Additionally, the vulnerability could be leveraged as a foothold in broader attacks targeting media companies, educational institutions, or cultural organizations that use such tools. The lack of authentication and low complexity of exploitation further increase the threat level.
Mitigation Recommendations
European organizations should immediately upgrade Dosage to version 3.2 or later, where this vulnerability is fixed. If upgrading is not immediately feasible, users should avoid downloading comics over unencrypted HTTP connections to prevent man-in-the-middle exploitation. Network defenses should be enhanced to detect and block suspicious HTTP traffic that attempts to manipulate Content-Type headers. Implement strict egress and ingress filtering to limit exposure to untrusted networks. Additionally, running Dosage with least privilege file system permissions can reduce the impact of arbitrary file writes. Monitoring file system changes in directories used by Dosage can help detect exploitation attempts. Organizations should also educate users about the risks of downloading content from untrusted sources and encourage the use of secure protocols (HTTPS). Regular vulnerability scanning and patch management processes should be enforced to prevent similar issues.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-28T21:07:16.440Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690d65e75b03e685488572fe
Added to database: 11/7/2025, 3:22:15 AM
Last enriched: 11/14/2025, 4:49:34 AM
Last updated: 12/22/2025, 7:23:02 AM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15014: SQL Injection in loganhong php loganSite
MediumCVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01
CriticalCVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
CriticalCVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
HighCVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.