CVE-2025-65952: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in iiDk-the-actual Console
Console is a network used to control Gorilla Tag mods' users and other users on the network. Prior to version 2.8.0, a path traversal vulnerability exists where complicated combinations of backslashes and periods can be used to escape the Gorilla Tag path and write to unwanted directories. This issue has been patched in version 2.8.0.
AI Analysis
Technical Summary
CVE-2025-65952 is a path traversal vulnerability classified under CWE-22 affecting the iiDk-the-actual Console software, which is used to control users of Gorilla Tag mods and other network users. The vulnerability exists in versions prior to 2.8.0 and allows an unauthenticated attacker to craft complex pathnames using combinations of backslashes and periods to bypass directory restrictions. This enables the attacker to write files outside the intended Gorilla Tag directory, potentially overwriting critical system files or placing malicious payloads in sensitive locations. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, low attack complexity, and no privileges or user interaction required. The impact on confidentiality is none, but integrity is high due to unauthorized file writes, and availability is not affected. The vulnerability was publicly disclosed on November 25, 2025, and has been patched in version 2.8.0 of the Console software. No known exploits have been reported in the wild, but the potential for exploitation remains significant given the ease of attack and the critical nature of file write capabilities. Organizations using affected versions should apply the patch immediately to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those involved in gaming communities, mod development, or any networked environments using the iiDk-the-actual Console software. Unauthorized file writes can lead to system compromise, data integrity loss, or persistent malware installation. The ability to write arbitrary files without authentication can be leveraged to escalate attacks, potentially impacting critical infrastructure if the software is used in broader network management contexts. The vulnerability could also be exploited to disrupt services or manipulate user data, undermining trust and operational stability. Given the network-exploitable nature and lack of required privileges, the threat can spread rapidly within vulnerable environments. Organizations failing to update may face increased risk of targeted attacks or opportunistic exploitation, especially as threat actors develop exploits post-disclosure.
Mitigation Recommendations
European organizations should immediately upgrade all instances of the iiDk-the-actual Console software to version 2.8.0 or later, where the vulnerability is patched. Network segmentation should be employed to isolate systems running this software from untrusted networks to reduce exposure. Implement strict input validation and sanitization on any interfaces accepting file paths to prevent malformed pathname exploitation. Monitor logs for unusual file write activities or access attempts outside expected directories. Employ application whitelisting and endpoint detection to identify and block unauthorized file modifications. Conduct regular vulnerability scans and penetration tests focusing on path traversal and directory escape vectors. Educate administrators and users about the risks of running outdated software versions and the importance of timely patching. If immediate patching is not feasible, consider disabling or restricting access to the Console software until updates can be applied.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Poland, Italy
CVE-2025-65952: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in iiDk-the-actual Console
Description
Console is a network used to control Gorilla Tag mods' users and other users on the network. Prior to version 2.8.0, a path traversal vulnerability exists where complicated combinations of backslashes and periods can be used to escape the Gorilla Tag path and write to unwanted directories. This issue has been patched in version 2.8.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-65952 is a path traversal vulnerability classified under CWE-22 affecting the iiDk-the-actual Console software, which is used to control users of Gorilla Tag mods and other network users. The vulnerability exists in versions prior to 2.8.0 and allows an unauthenticated attacker to craft complex pathnames using combinations of backslashes and periods to bypass directory restrictions. This enables the attacker to write files outside the intended Gorilla Tag directory, potentially overwriting critical system files or placing malicious payloads in sensitive locations. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, low attack complexity, and no privileges or user interaction required. The impact on confidentiality is none, but integrity is high due to unauthorized file writes, and availability is not affected. The vulnerability was publicly disclosed on November 25, 2025, and has been patched in version 2.8.0 of the Console software. No known exploits have been reported in the wild, but the potential for exploitation remains significant given the ease of attack and the critical nature of file write capabilities. Organizations using affected versions should apply the patch immediately to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those involved in gaming communities, mod development, or any networked environments using the iiDk-the-actual Console software. Unauthorized file writes can lead to system compromise, data integrity loss, or persistent malware installation. The ability to write arbitrary files without authentication can be leveraged to escalate attacks, potentially impacting critical infrastructure if the software is used in broader network management contexts. The vulnerability could also be exploited to disrupt services or manipulate user data, undermining trust and operational stability. Given the network-exploitable nature and lack of required privileges, the threat can spread rapidly within vulnerable environments. Organizations failing to update may face increased risk of targeted attacks or opportunistic exploitation, especially as threat actors develop exploits post-disclosure.
Mitigation Recommendations
European organizations should immediately upgrade all instances of the iiDk-the-actual Console software to version 2.8.0 or later, where the vulnerability is patched. Network segmentation should be employed to isolate systems running this software from untrusted networks to reduce exposure. Implement strict input validation and sanitization on any interfaces accepting file paths to prevent malformed pathname exploitation. Monitor logs for unusual file write activities or access attempts outside expected directories. Employ application whitelisting and endpoint detection to identify and block unauthorized file modifications. Conduct regular vulnerability scans and penetration tests focusing on path traversal and directory escape vectors. Educate administrators and users about the risks of running outdated software versions and the importance of timely patching. If immediate patching is not feasible, consider disabling or restricting access to the Console software until updates can be applied.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-18T16:14:56.693Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69263566acb2eea424e18f87
Added to database: 11/25/2025, 11:01:58 PM
Last enriched: 11/25/2025, 11:16:48 PM
Last updated: 11/26/2025, 1:02:31 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65957: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Intercore-Productions Core-Bot
HighCVE-2025-64657: CWE-121: Stack-based Buffer Overflow in Microsoft Azure App Gateway
CriticalCVE-2025-64656: CWE-125: Out-of-bounds Read in Microsoft Azure App Gateway
CriticalCVE-2025-66019: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumCVE-2025-65963: CWE-284: Improper Access Control in humhub cfiles
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.