Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65074: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WaveStore WaveStore Server

0
High
VulnerabilityCVE-2025-65074cvecve-2025-65074cwe-22cwe-78
Published: Tue Dec 16 2025 (12/16/2025, 12:25:15 UTC)
Source: CVE Database V5
Vendor/Project: WaveStore
Product: WaveStore Server

Description

WaveView client allows users to execute restricted set of predefined commands and scripts on the connected WaveStore Server. A malicious attacker with high-privileges is able to execute arbitrary OS commands on the server using path traversal in the showerr script. This issue was fixed in version 6.44.44

AI-Powered Analysis

AILast updated: 12/23/2025, 13:26:29 UTC

Technical Analysis

CVE-2025-65074 is a vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-78 (OS Command Injection) affecting WaveStore Server. The issue stems from the WaveView client’s ability to execute a limited set of predefined commands and scripts on the connected WaveStore Server. However, due to insufficient validation of pathname inputs in the 'showerr' script, an attacker with high privileges can perform path traversal attacks to escape intended directory restrictions. This allows the attacker to execute arbitrary operating system commands on the server, potentially leading to full system compromise. The vulnerability does not require user interaction or additional authentication beyond high privileges, making it easier to exploit once access is obtained. The CVSS v4.0 score is 8.6 (high), reflecting the critical impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for user interaction. The vulnerability was publicly disclosed on December 16, 2025, and fixed in WaveStore Server version 6.44.44. No public exploits have been reported yet, but the potential for severe damage exists if exploited. The vulnerability is particularly dangerous in environments where WaveStore Server manages critical data or infrastructure, as attackers could leverage this flaw to gain persistent control or disrupt services.

Potential Impact

For European organizations, exploitation of this vulnerability could result in unauthorized command execution on WaveStore Servers, leading to data breaches, service disruptions, or full system takeover. This could compromise sensitive data confidentiality, alter or destroy data integrity, and cause denial of service, impacting business continuity. Organizations in sectors such as finance, healthcare, manufacturing, and critical infrastructure that rely on WaveStore Server for data storage or management are at heightened risk. The requirement for high privileges means initial access control failures or insider threats could be leveraged to exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. The impact is amplified in environments with poor patch management or where WaveStore Server is exposed to untrusted networks.

Mitigation Recommendations

European organizations should immediately verify their WaveStore Server versions and upgrade to version 6.44.44 or later to remediate the vulnerability. Implement strict access controls to limit high-privilege user accounts and monitor their activities closely. Employ network segmentation to isolate WaveStore Servers from untrusted networks and restrict administrative access to trusted hosts only. Conduct regular audits of command execution logs on WaveStore Servers to detect anomalous or unauthorized activities. Use application whitelisting and endpoint detection and response (EDR) solutions to identify and block suspicious command executions. Additionally, review and harden the configuration of the WaveView client to minimize unnecessary command execution capabilities. Establish incident response plans specifically addressing potential exploitation scenarios involving WaveStore Server. Finally, maintain up-to-date backups and test recovery procedures to mitigate potential data loss or service disruption.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-17T09:20:09.472Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694154d05e006677ae0dd860

Added to database: 12/16/2025, 12:47:12 PM

Last enriched: 12/23/2025, 1:26:29 PM

Last updated: 2/7/2026, 8:44:50 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats