Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66386: n/a

0
Medium
VulnerabilityCVE-2025-66386cvecve-2025-66386
Published: Fri Nov 28 2025 (11/28/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-66386 is a path traversal vulnerability in the MISP platform prior to version 2. 5. 27, specifically in the app/Model/EventReport. php component. This flaw allows a site-admin user to manipulate file paths when viewing pictures, potentially accessing unauthorized files on the server. Although exploitation requires site-admin privileges, successful attacks could lead to unauthorized disclosure of sensitive files, impacting confidentiality. There are no known exploits in the wild yet, and no CVSS score has been assigned. The vulnerability affects MISP instances running versions before 2. 5. 27.

AI-Powered Analysis

AILast updated: 11/28/2025, 07:16:46 UTC

Technical Analysis

CVE-2025-66386 is a path traversal vulnerability identified in the MISP (Malware Information Sharing Platform & Threat Sharing) software before version 2.5.27. The vulnerability resides in the app/Model/EventReport.php file, specifically within the functionality that handles viewing pictures associated with events. A path traversal flaw allows an attacker with site-admin privileges to manipulate the file path parameters to access files outside the intended directory scope. This can lead to unauthorized reading of arbitrary files on the server hosting MISP, potentially exposing sensitive information stored on the system. Since exploitation requires site-admin privileges, the attack surface is limited to trusted users or accounts that have been compromised. No public exploits have been reported, and no CVSS score has been assigned as of the publication date. The vulnerability was reserved and published on November 28, 2025. MISP is widely used by security teams and CERTs (Computer Emergency Response Teams) for sharing cyber threat intelligence, making the confidentiality of stored data critical. The lack of a patch link suggests that users should upgrade to version 2.5.27 or later, where this issue is presumably fixed. The vulnerability does not appear to allow remote code execution or privilege escalation beyond the site-admin role but can undermine data confidentiality and trust in the platform.

Potential Impact

For European organizations, the impact of CVE-2025-66386 primarily concerns the confidentiality of sensitive threat intelligence data stored within MISP instances. Unauthorized file access could expose internal reports, indicators of compromise, or other classified information shared among trusted partners. This could lead to intelligence leaks, undermining incident response efforts and potentially aiding adversaries. Since exploitation requires site-admin privileges, the risk is heightened if site-admin accounts are compromised or if malicious insiders exist. Availability and integrity impacts are limited, as the vulnerability does not enable direct modification or deletion of data or denial of service. However, the breach of confidentiality alone can have serious consequences for organizations involved in cybersecurity operations, especially those in critical infrastructure sectors or government agencies. The threat is more acute for organizations that heavily rely on MISP for collaborative defense and have not yet updated to the fixed version.

Mitigation Recommendations

1. Upgrade all MISP instances to version 2.5.27 or later immediately to ensure the vulnerability is patched. 2. Restrict site-admin privileges strictly to trusted personnel and enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of account compromise. 3. Conduct regular audits of site-admin accounts and their activities to detect any unauthorized access or suspicious behavior. 4. Implement network segmentation and access controls to limit exposure of MISP servers to only necessary users and systems. 5. Monitor logs for unusual file access patterns or attempts to exploit path traversal vectors. 6. Educate site-admin users about the risks of phishing and credential theft to prevent privilege escalation. 7. If upgrading immediately is not feasible, consider applying temporary access restrictions or disabling picture viewing features for site-admins until a patch is applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-28T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69294930842b163e002c8eae

Added to database: 11/28/2025, 7:03:12 AM

Last enriched: 11/28/2025, 7:16:46 AM

Last updated: 11/28/2025, 8:23:59 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats