CVE-2025-65076: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WaveStore WaveStore Server
WaveView client allows users to execute restricted set of predefined commands and scripts on the connected WaveStore Server. A malicious attacker with high-privileges is able to read or delete any file on the server using path traversal in the ilog script. This script is being run with root privileges. This issue was fixed in version 6.44.44
AI Analysis
Technical Summary
CVE-2025-65076 is a path traversal vulnerability (CWE-22) affecting the WaveStore Server product. The vulnerability arises because the WaveView client allows execution of a restricted set of predefined commands and scripts on the connected WaveStore Server. Specifically, the ilog script, which is run with root privileges, does not properly limit pathname inputs, enabling an attacker with high privileges to manipulate file paths to access or delete arbitrary files on the server. This improper limitation of pathname inputs allows traversal outside intended directories, bypassing security controls. The vulnerability requires the attacker to already have high privileges on the system, but does not require user interaction or authentication bypass, making it relatively straightforward to exploit once access is obtained. The impact includes unauthorized reading or deletion of any file on the server, potentially leading to full system compromise or data loss. The issue was addressed and fixed in WaveStore Server version 6.44.44. The CVSS 4.0 base score is 8.6, reflecting high severity due to network attack vector, low attack complexity, no privileges required beyond high privileges, no user interaction, and high impact on confidentiality and integrity. No public exploits are currently known, but the vulnerability presents a significant risk to affected systems.
Potential Impact
For European organizations, this vulnerability poses a serious risk to confidentiality and integrity of critical data stored on WaveStore Servers. Since the ilog script runs with root privileges, exploitation can lead to complete system compromise, unauthorized data access, or deletion, disrupting business operations. Organizations in sectors such as finance, healthcare, manufacturing, and government that rely on WaveStore Server for data storage and management could face operational downtime, regulatory non-compliance, and reputational damage. The ability to delete arbitrary files also raises the risk of ransomware or destructive attacks. Given the network attack vector and ease of exploitation by a high-privileged insider or attacker who has gained elevated access, the threat is significant. The lack of known exploits in the wild reduces immediate risk but does not diminish the urgency of patching. Failure to remediate could lead to targeted attacks, especially in critical infrastructure environments prevalent in Europe.
Mitigation Recommendations
European organizations should immediately upgrade WaveStore Server installations to version 6.44.44 or later, where the vulnerability is fixed. Until patching is possible, restrict access to the WaveView client and WaveStore Server to trusted administrators only, employing network segmentation and strict access controls. Implement robust monitoring and logging of command executions on WaveStore Servers to detect suspicious activity related to the ilog script. Enforce the principle of least privilege to limit the number of users with high privileges capable of exploiting this vulnerability. Conduct regular audits of user privileges and review system configurations to ensure no unnecessary elevated access exists. Additionally, consider deploying file integrity monitoring solutions to detect unauthorized file deletions or modifications. Organizations should also prepare incident response plans to quickly address potential exploitation. Finally, maintain up-to-date backups of critical data to enable recovery in case of file deletion or corruption.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Belgium, Sweden, Poland, Spain, Switzerland
CVE-2025-65076: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WaveStore WaveStore Server
Description
WaveView client allows users to execute restricted set of predefined commands and scripts on the connected WaveStore Server. A malicious attacker with high-privileges is able to read or delete any file on the server using path traversal in the ilog script. This script is being run with root privileges. This issue was fixed in version 6.44.44
AI-Powered Analysis
Technical Analysis
CVE-2025-65076 is a path traversal vulnerability (CWE-22) affecting the WaveStore Server product. The vulnerability arises because the WaveView client allows execution of a restricted set of predefined commands and scripts on the connected WaveStore Server. Specifically, the ilog script, which is run with root privileges, does not properly limit pathname inputs, enabling an attacker with high privileges to manipulate file paths to access or delete arbitrary files on the server. This improper limitation of pathname inputs allows traversal outside intended directories, bypassing security controls. The vulnerability requires the attacker to already have high privileges on the system, but does not require user interaction or authentication bypass, making it relatively straightforward to exploit once access is obtained. The impact includes unauthorized reading or deletion of any file on the server, potentially leading to full system compromise or data loss. The issue was addressed and fixed in WaveStore Server version 6.44.44. The CVSS 4.0 base score is 8.6, reflecting high severity due to network attack vector, low attack complexity, no privileges required beyond high privileges, no user interaction, and high impact on confidentiality and integrity. No public exploits are currently known, but the vulnerability presents a significant risk to affected systems.
Potential Impact
For European organizations, this vulnerability poses a serious risk to confidentiality and integrity of critical data stored on WaveStore Servers. Since the ilog script runs with root privileges, exploitation can lead to complete system compromise, unauthorized data access, or deletion, disrupting business operations. Organizations in sectors such as finance, healthcare, manufacturing, and government that rely on WaveStore Server for data storage and management could face operational downtime, regulatory non-compliance, and reputational damage. The ability to delete arbitrary files also raises the risk of ransomware or destructive attacks. Given the network attack vector and ease of exploitation by a high-privileged insider or attacker who has gained elevated access, the threat is significant. The lack of known exploits in the wild reduces immediate risk but does not diminish the urgency of patching. Failure to remediate could lead to targeted attacks, especially in critical infrastructure environments prevalent in Europe.
Mitigation Recommendations
European organizations should immediately upgrade WaveStore Server installations to version 6.44.44 or later, where the vulnerability is fixed. Until patching is possible, restrict access to the WaveView client and WaveStore Server to trusted administrators only, employing network segmentation and strict access controls. Implement robust monitoring and logging of command executions on WaveStore Servers to detect suspicious activity related to the ilog script. Enforce the principle of least privilege to limit the number of users with high privileges capable of exploiting this vulnerability. Conduct regular audits of user privileges and review system configurations to ensure no unnecessary elevated access exists. Additionally, consider deploying file integrity monitoring solutions to detect unauthorized file deletions or modifications. Organizations should also prepare incident response plans to quickly address potential exploitation. Finally, maintain up-to-date backups of critical data to enable recovery in case of file deletion or corruption.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-11-17T09:20:09.473Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694154d05e006677ae0dd914
Added to database: 12/16/2025, 12:47:12 PM
Last enriched: 12/23/2025, 1:27:00 PM
Last updated: 2/7/2026, 7:28:55 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.