Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65952: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in iiDk-the-actual Console

0
High
VulnerabilityCVE-2025-65952cvecve-2025-65952cwe-22
Published: Tue Nov 25 2025 (11/25/2025, 22:54:24 UTC)
Source: CVE Database V5
Vendor/Project: iiDk-the-actual
Product: Console

Description

Console is a network used to control Gorilla Tag mods' users and other users on the network. Prior to version 2.8.0, a path traversal vulnerability exists where complicated combinations of backslashes and periods can be used to escape the Gorilla Tag path and write to unwanted directories. This issue has been patched in version 2.8.0.

AI-Powered Analysis

AILast updated: 11/25/2025, 23:16:48 UTC

Technical Analysis

CVE-2025-65952 is a path traversal vulnerability classified under CWE-22 affecting the iiDk-the-actual Console software, which is used to control users of Gorilla Tag mods and other network users. The vulnerability exists in versions prior to 2.8.0 and allows an unauthenticated attacker to craft complex pathnames using combinations of backslashes and periods to bypass directory restrictions. This enables the attacker to write files outside the intended Gorilla Tag directory, potentially overwriting critical system files or placing malicious payloads in sensitive locations. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, low attack complexity, and no privileges or user interaction required. The impact on confidentiality is none, but integrity is high due to unauthorized file writes, and availability is not affected. The vulnerability was publicly disclosed on November 25, 2025, and has been patched in version 2.8.0 of the Console software. No known exploits have been reported in the wild, but the potential for exploitation remains significant given the ease of attack and the critical nature of file write capabilities. Organizations using affected versions should apply the patch immediately to prevent exploitation.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those involved in gaming communities, mod development, or any networked environments using the iiDk-the-actual Console software. Unauthorized file writes can lead to system compromise, data integrity loss, or persistent malware installation. The ability to write arbitrary files without authentication can be leveraged to escalate attacks, potentially impacting critical infrastructure if the software is used in broader network management contexts. The vulnerability could also be exploited to disrupt services or manipulate user data, undermining trust and operational stability. Given the network-exploitable nature and lack of required privileges, the threat can spread rapidly within vulnerable environments. Organizations failing to update may face increased risk of targeted attacks or opportunistic exploitation, especially as threat actors develop exploits post-disclosure.

Mitigation Recommendations

European organizations should immediately upgrade all instances of the iiDk-the-actual Console software to version 2.8.0 or later, where the vulnerability is patched. Network segmentation should be employed to isolate systems running this software from untrusted networks to reduce exposure. Implement strict input validation and sanitization on any interfaces accepting file paths to prevent malformed pathname exploitation. Monitor logs for unusual file write activities or access attempts outside expected directories. Employ application whitelisting and endpoint detection to identify and block unauthorized file modifications. Conduct regular vulnerability scans and penetration tests focusing on path traversal and directory escape vectors. Educate administrators and users about the risks of running outdated software versions and the importance of timely patching. If immediate patching is not feasible, consider disabling or restricting access to the Console software until updates can be applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-18T16:14:56.693Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69263566acb2eea424e18f87

Added to database: 11/25/2025, 11:01:58 PM

Last enriched: 11/25/2025, 11:16:48 PM

Last updated: 11/26/2025, 1:02:31 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats