CVE-2025-66386: n/a
CVE-2025-66386 is a path traversal vulnerability in the MISP platform prior to version 2. 5. 27, specifically in the app/Model/EventReport. php component. This flaw allows a site-admin user to manipulate file paths when viewing pictures, potentially accessing unauthorized files on the server. Although exploitation requires site-admin privileges, successful attacks could lead to unauthorized disclosure of sensitive files, impacting confidentiality. There are no known exploits in the wild yet, and no CVSS score has been assigned. The vulnerability affects MISP instances running versions before 2. 5. 27.
AI Analysis
Technical Summary
CVE-2025-66386 is a path traversal vulnerability identified in the MISP (Malware Information Sharing Platform & Threat Sharing) software before version 2.5.27. The vulnerability resides in the app/Model/EventReport.php file, specifically within the functionality that handles viewing pictures associated with events. A path traversal flaw allows an attacker with site-admin privileges to manipulate the file path parameters to access files outside the intended directory scope. This can lead to unauthorized reading of arbitrary files on the server hosting MISP, potentially exposing sensitive information stored on the system. Since exploitation requires site-admin privileges, the attack surface is limited to trusted users or accounts that have been compromised. No public exploits have been reported, and no CVSS score has been assigned as of the publication date. The vulnerability was reserved and published on November 28, 2025. MISP is widely used by security teams and CERTs (Computer Emergency Response Teams) for sharing cyber threat intelligence, making the confidentiality of stored data critical. The lack of a patch link suggests that users should upgrade to version 2.5.27 or later, where this issue is presumably fixed. The vulnerability does not appear to allow remote code execution or privilege escalation beyond the site-admin role but can undermine data confidentiality and trust in the platform.
Potential Impact
For European organizations, the impact of CVE-2025-66386 primarily concerns the confidentiality of sensitive threat intelligence data stored within MISP instances. Unauthorized file access could expose internal reports, indicators of compromise, or other classified information shared among trusted partners. This could lead to intelligence leaks, undermining incident response efforts and potentially aiding adversaries. Since exploitation requires site-admin privileges, the risk is heightened if site-admin accounts are compromised or if malicious insiders exist. Availability and integrity impacts are limited, as the vulnerability does not enable direct modification or deletion of data or denial of service. However, the breach of confidentiality alone can have serious consequences for organizations involved in cybersecurity operations, especially those in critical infrastructure sectors or government agencies. The threat is more acute for organizations that heavily rely on MISP for collaborative defense and have not yet updated to the fixed version.
Mitigation Recommendations
1. Upgrade all MISP instances to version 2.5.27 or later immediately to ensure the vulnerability is patched. 2. Restrict site-admin privileges strictly to trusted personnel and enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of account compromise. 3. Conduct regular audits of site-admin accounts and their activities to detect any unauthorized access or suspicious behavior. 4. Implement network segmentation and access controls to limit exposure of MISP servers to only necessary users and systems. 5. Monitor logs for unusual file access patterns or attempts to exploit path traversal vectors. 6. Educate site-admin users about the risks of phishing and credential theft to prevent privilege escalation. 7. If upgrading immediately is not feasible, consider applying temporary access restrictions or disabling picture viewing features for site-admins until a patch is applied.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-66386: n/a
Description
CVE-2025-66386 is a path traversal vulnerability in the MISP platform prior to version 2. 5. 27, specifically in the app/Model/EventReport. php component. This flaw allows a site-admin user to manipulate file paths when viewing pictures, potentially accessing unauthorized files on the server. Although exploitation requires site-admin privileges, successful attacks could lead to unauthorized disclosure of sensitive files, impacting confidentiality. There are no known exploits in the wild yet, and no CVSS score has been assigned. The vulnerability affects MISP instances running versions before 2. 5. 27.
AI-Powered Analysis
Technical Analysis
CVE-2025-66386 is a path traversal vulnerability identified in the MISP (Malware Information Sharing Platform & Threat Sharing) software before version 2.5.27. The vulnerability resides in the app/Model/EventReport.php file, specifically within the functionality that handles viewing pictures associated with events. A path traversal flaw allows an attacker with site-admin privileges to manipulate the file path parameters to access files outside the intended directory scope. This can lead to unauthorized reading of arbitrary files on the server hosting MISP, potentially exposing sensitive information stored on the system. Since exploitation requires site-admin privileges, the attack surface is limited to trusted users or accounts that have been compromised. No public exploits have been reported, and no CVSS score has been assigned as of the publication date. The vulnerability was reserved and published on November 28, 2025. MISP is widely used by security teams and CERTs (Computer Emergency Response Teams) for sharing cyber threat intelligence, making the confidentiality of stored data critical. The lack of a patch link suggests that users should upgrade to version 2.5.27 or later, where this issue is presumably fixed. The vulnerability does not appear to allow remote code execution or privilege escalation beyond the site-admin role but can undermine data confidentiality and trust in the platform.
Potential Impact
For European organizations, the impact of CVE-2025-66386 primarily concerns the confidentiality of sensitive threat intelligence data stored within MISP instances. Unauthorized file access could expose internal reports, indicators of compromise, or other classified information shared among trusted partners. This could lead to intelligence leaks, undermining incident response efforts and potentially aiding adversaries. Since exploitation requires site-admin privileges, the risk is heightened if site-admin accounts are compromised or if malicious insiders exist. Availability and integrity impacts are limited, as the vulnerability does not enable direct modification or deletion of data or denial of service. However, the breach of confidentiality alone can have serious consequences for organizations involved in cybersecurity operations, especially those in critical infrastructure sectors or government agencies. The threat is more acute for organizations that heavily rely on MISP for collaborative defense and have not yet updated to the fixed version.
Mitigation Recommendations
1. Upgrade all MISP instances to version 2.5.27 or later immediately to ensure the vulnerability is patched. 2. Restrict site-admin privileges strictly to trusted personnel and enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of account compromise. 3. Conduct regular audits of site-admin accounts and their activities to detect any unauthorized access or suspicious behavior. 4. Implement network segmentation and access controls to limit exposure of MISP servers to only necessary users and systems. 5. Monitor logs for unusual file access patterns or attempts to exploit path traversal vectors. 6. Educate site-admin users about the risks of phishing and credential theft to prevent privilege escalation. 7. If upgrading immediately is not feasible, consider applying temporary access restrictions or disabling picture viewing features for site-admins until a patch is applied.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-28T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69294930842b163e002c8eae
Added to database: 11/28/2025, 7:03:12 AM
Last enriched: 11/28/2025, 7:16:46 AM
Last updated: 11/28/2025, 8:23:59 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13771: CWE-23 Relative Path Traversal in Uniong WebITR
HighCVE-2025-13768: CWE-639 Authorization Bypass Through User-Controlled Key in Uniong WebITR
HighCVE-2025-13770: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Uniong WebITR
HighCVE-2025-13769: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Uniong WebITR
HighCVE-2025-66385: CWE-472 External Control of Assumed-Immutable Web Parameter in cerebrate-project Cerebrate
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.