CVE-2025-65074: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WaveStore WaveStore Server
WaveView client allows users to execute restricted set of predefined commands and scripts on the connected WaveStore Server. A malicious attacker with high-privileges is able to execute arbitrary OS commands on the server using path traversal in the showerr script. This issue was fixed in version 6.44.44
AI Analysis
Technical Summary
CVE-2025-65074 is a vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-78 (OS Command Injection) affecting WaveStore Server. The issue stems from the WaveView client’s ability to execute a limited set of predefined commands and scripts on the connected WaveStore Server. However, due to insufficient validation of pathname inputs in the 'showerr' script, an attacker with high privileges can perform path traversal attacks to escape intended directory restrictions. This allows the attacker to execute arbitrary operating system commands on the server, potentially leading to full system compromise. The vulnerability does not require user interaction or additional authentication beyond high privileges, making it easier to exploit once access is obtained. The CVSS v4.0 score is 8.6 (high), reflecting the critical impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for user interaction. The vulnerability was publicly disclosed on December 16, 2025, and fixed in WaveStore Server version 6.44.44. No public exploits have been reported yet, but the potential for severe damage exists if exploited. The vulnerability is particularly dangerous in environments where WaveStore Server manages critical data or infrastructure, as attackers could leverage this flaw to gain persistent control or disrupt services.
Potential Impact
For European organizations, exploitation of this vulnerability could result in unauthorized command execution on WaveStore Servers, leading to data breaches, service disruptions, or full system takeover. This could compromise sensitive data confidentiality, alter or destroy data integrity, and cause denial of service, impacting business continuity. Organizations in sectors such as finance, healthcare, manufacturing, and critical infrastructure that rely on WaveStore Server for data storage or management are at heightened risk. The requirement for high privileges means initial access control failures or insider threats could be leveraged to exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. The impact is amplified in environments with poor patch management or where WaveStore Server is exposed to untrusted networks.
Mitigation Recommendations
European organizations should immediately verify their WaveStore Server versions and upgrade to version 6.44.44 or later to remediate the vulnerability. Implement strict access controls to limit high-privilege user accounts and monitor their activities closely. Employ network segmentation to isolate WaveStore Servers from untrusted networks and restrict administrative access to trusted hosts only. Conduct regular audits of command execution logs on WaveStore Servers to detect anomalous or unauthorized activities. Use application whitelisting and endpoint detection and response (EDR) solutions to identify and block suspicious command executions. Additionally, review and harden the configuration of the WaveView client to minimize unnecessary command execution capabilities. Establish incident response plans specifically addressing potential exploitation scenarios involving WaveStore Server. Finally, maintain up-to-date backups and test recovery procedures to mitigate potential data loss or service disruption.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Switzerland
CVE-2025-65074: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WaveStore WaveStore Server
Description
WaveView client allows users to execute restricted set of predefined commands and scripts on the connected WaveStore Server. A malicious attacker with high-privileges is able to execute arbitrary OS commands on the server using path traversal in the showerr script. This issue was fixed in version 6.44.44
AI-Powered Analysis
Technical Analysis
CVE-2025-65074 is a vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-78 (OS Command Injection) affecting WaveStore Server. The issue stems from the WaveView client’s ability to execute a limited set of predefined commands and scripts on the connected WaveStore Server. However, due to insufficient validation of pathname inputs in the 'showerr' script, an attacker with high privileges can perform path traversal attacks to escape intended directory restrictions. This allows the attacker to execute arbitrary operating system commands on the server, potentially leading to full system compromise. The vulnerability does not require user interaction or additional authentication beyond high privileges, making it easier to exploit once access is obtained. The CVSS v4.0 score is 8.6 (high), reflecting the critical impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for user interaction. The vulnerability was publicly disclosed on December 16, 2025, and fixed in WaveStore Server version 6.44.44. No public exploits have been reported yet, but the potential for severe damage exists if exploited. The vulnerability is particularly dangerous in environments where WaveStore Server manages critical data or infrastructure, as attackers could leverage this flaw to gain persistent control or disrupt services.
Potential Impact
For European organizations, exploitation of this vulnerability could result in unauthorized command execution on WaveStore Servers, leading to data breaches, service disruptions, or full system takeover. This could compromise sensitive data confidentiality, alter or destroy data integrity, and cause denial of service, impacting business continuity. Organizations in sectors such as finance, healthcare, manufacturing, and critical infrastructure that rely on WaveStore Server for data storage or management are at heightened risk. The requirement for high privileges means initial access control failures or insider threats could be leveraged to exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. The impact is amplified in environments with poor patch management or where WaveStore Server is exposed to untrusted networks.
Mitigation Recommendations
European organizations should immediately verify their WaveStore Server versions and upgrade to version 6.44.44 or later to remediate the vulnerability. Implement strict access controls to limit high-privilege user accounts and monitor their activities closely. Employ network segmentation to isolate WaveStore Servers from untrusted networks and restrict administrative access to trusted hosts only. Conduct regular audits of command execution logs on WaveStore Servers to detect anomalous or unauthorized activities. Use application whitelisting and endpoint detection and response (EDR) solutions to identify and block suspicious command executions. Additionally, review and harden the configuration of the WaveView client to minimize unnecessary command execution capabilities. Establish incident response plans specifically addressing potential exploitation scenarios involving WaveStore Server. Finally, maintain up-to-date backups and test recovery procedures to mitigate potential data loss or service disruption.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-11-17T09:20:09.472Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694154d05e006677ae0dd860
Added to database: 12/16/2025, 12:47:12 PM
Last enriched: 12/23/2025, 1:26:29 PM
Last updated: 2/7/2026, 8:44:50 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighCVE-2026-2074: XML External Entity Reference in O2OA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.