Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66449: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in C4illin ConvertX

0
High
VulnerabilityCVE-2025-66449cvecve-2025-66449cwe-22cwe-73cwe-434
Published: Tue Dec 16 2025 (12/16/2025, 00:10:49 UTC)
Source: CVE Database V5
Vendor/Project: C4illin
Product: ConvertX

Description

ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 12/16/2025, 01:01:12 UTC

Technical Analysis

CVE-2025-66449 is a path traversal vulnerability classified under CWE-22, CWE-73, and CWE-434 affecting C4illin's ConvertX, a self-hosted online file converter. The vulnerability exists in versions prior to 0.16.0 within the /upload endpoint, which accepts a file upload request from authenticated users. The core issue is that the application directly uses the user-supplied file.name parameter without any sanitization or validation, allowing attackers to craft file paths that traverse directories and write files outside the intended upload directory. This arbitrary file write capability can be exploited to overwrite critical system binaries or application files, effectively enabling remote code execution with the privileges of the ConvertX service. The vulnerability does not require user interaction beyond authentication, and the attack surface is network-exposed since the service is self-hosted and accessible over HTTP/S. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction. The vendor has addressed the issue in version 0.16.0 by implementing proper input validation and sanitization of file paths to restrict file writes to authorized directories. No public exploits have been observed yet, but the vulnerability poses a significant risk if left unpatched, especially in environments where ConvertX is deployed with elevated privileges or on critical infrastructure.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to full system compromise of servers running vulnerable ConvertX versions. This could result in unauthorized access to sensitive data, disruption of file conversion services, and potential lateral movement within internal networks. Critical sectors such as finance, healthcare, and government agencies that rely on file conversion workflows may face operational downtime and data breaches. The ability to overwrite system binaries elevates the risk to complete system takeover, which could be leveraged for espionage, ransomware deployment, or sabotage. Given the self-hosted nature of ConvertX, organizations with less mature patch management or weaker authentication controls are particularly vulnerable. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation. Attackers targeting European entities could exploit this vulnerability to gain footholds in networks, especially where ConvertX is integrated into automated document processing pipelines.

Mitigation Recommendations

European organizations should immediately upgrade ConvertX installations to version 0.16.0 or later to apply the official patch. Until upgrades are completed, restrict access to the /upload endpoint using network segmentation and firewall rules to limit exposure to trusted users only. Implement strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of credential compromise. Conduct thorough audits of file upload logs to detect suspicious file names or unauthorized file writes. Employ host-based intrusion detection systems (HIDS) to monitor critical system binaries for unauthorized changes. Additionally, apply application-layer input validation and sanitization as an extra defense layer if upgrading is delayed. Regularly back up critical data and system configurations to enable recovery in case of compromise. Finally, educate administrators and users about the risks of uploading files with malicious names and enforce the principle of least privilege for the ConvertX service account to limit potential damage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-01T18:22:06.865Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6940abb2d9bcdf3f3d143143

Added to database: 12/16/2025, 12:45:38 AM

Last enriched: 12/16/2025, 1:01:12 AM

Last updated: 12/18/2025, 12:28:38 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats