CVE-2025-66449: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in C4illin ConvertX
ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-66449 is a path traversal vulnerability (CWE-22) affecting C4illin's ConvertX, a self-hosted online file converter. In versions before 0.16.0, the /upload endpoint improperly handles the filename parameter supplied by authenticated users, failing to sanitize or restrict the pathname. This flaw allows attackers to write files outside the intended upload directory, including overwriting system binaries. By replacing critical executables with malicious payloads, attackers can achieve arbitrary code execution with the privileges of the ConvertX service. The vulnerability also relates to CWE-73 (External Control of File Name or Path) and CWE-434 (Unrestricted Upload of File with Dangerous Type). Exploitation requires valid authentication but no further user interaction, making it a significant risk in environments where user credentials can be compromised or are shared. The vendor released version 0.16.0 to patch this issue by implementing proper filename sanitization and path restrictions. Although no known exploits are currently reported in the wild, the high CVSS score (8.8) indicates a critical risk if exploited. The vulnerability impacts confidentiality, integrity, and availability, as attackers can fully control affected systems, potentially leading to data theft, system manipulation, or denial of service.
Potential Impact
For European organizations, this vulnerability poses a severe threat especially to those deploying ConvertX in production environments for file conversion services. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, manipulate or steal sensitive data, disrupt services, and potentially pivot to other internal systems. Industries such as finance, healthcare, government, and critical infrastructure that rely on self-hosted file conversion tools are particularly at risk. The requirement for authentication limits exposure but does not eliminate risk, as credential theft or insider threats could enable exploitation. Additionally, the ability to overwrite system binaries elevates the attack impact beyond typical file upload vulnerabilities, potentially allowing persistent and stealthy control over affected systems. This could result in regulatory non-compliance, financial losses, reputational damage, and operational downtime.
Mitigation Recommendations
European organizations should immediately upgrade all ConvertX instances to version 0.16.0 or later to apply the official patch. Until upgrade, implement strict input validation and sanitization on the filename parameter at the application or web server level to prevent path traversal. Restrict file system permissions for the ConvertX service account to limit write access only to necessary directories, preventing overwriting of critical binaries. Employ application-layer firewalls or intrusion detection systems to monitor and block suspicious upload requests. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce risk of credential compromise. Regularly audit file integrity on servers hosting ConvertX to detect unauthorized changes. Additionally, segment the network to isolate file conversion services from sensitive systems and maintain up-to-date backups to enable recovery from potential compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-66449: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in C4illin ConvertX
Description
ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-66449 is a path traversal vulnerability (CWE-22) affecting C4illin's ConvertX, a self-hosted online file converter. In versions before 0.16.0, the /upload endpoint improperly handles the filename parameter supplied by authenticated users, failing to sanitize or restrict the pathname. This flaw allows attackers to write files outside the intended upload directory, including overwriting system binaries. By replacing critical executables with malicious payloads, attackers can achieve arbitrary code execution with the privileges of the ConvertX service. The vulnerability also relates to CWE-73 (External Control of File Name or Path) and CWE-434 (Unrestricted Upload of File with Dangerous Type). Exploitation requires valid authentication but no further user interaction, making it a significant risk in environments where user credentials can be compromised or are shared. The vendor released version 0.16.0 to patch this issue by implementing proper filename sanitization and path restrictions. Although no known exploits are currently reported in the wild, the high CVSS score (8.8) indicates a critical risk if exploited. The vulnerability impacts confidentiality, integrity, and availability, as attackers can fully control affected systems, potentially leading to data theft, system manipulation, or denial of service.
Potential Impact
For European organizations, this vulnerability poses a severe threat especially to those deploying ConvertX in production environments for file conversion services. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, manipulate or steal sensitive data, disrupt services, and potentially pivot to other internal systems. Industries such as finance, healthcare, government, and critical infrastructure that rely on self-hosted file conversion tools are particularly at risk. The requirement for authentication limits exposure but does not eliminate risk, as credential theft or insider threats could enable exploitation. Additionally, the ability to overwrite system binaries elevates the attack impact beyond typical file upload vulnerabilities, potentially allowing persistent and stealthy control over affected systems. This could result in regulatory non-compliance, financial losses, reputational damage, and operational downtime.
Mitigation Recommendations
European organizations should immediately upgrade all ConvertX instances to version 0.16.0 or later to apply the official patch. Until upgrade, implement strict input validation and sanitization on the filename parameter at the application or web server level to prevent path traversal. Restrict file system permissions for the ConvertX service account to limit write access only to necessary directories, preventing overwriting of critical binaries. Employ application-layer firewalls or intrusion detection systems to monitor and block suspicious upload requests. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce risk of credential compromise. Regularly audit file integrity on servers hosting ConvertX to detect unauthorized changes. Additionally, segment the network to isolate file conversion services from sensitive systems and maintain up-to-date backups to enable recovery from potential compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-01T18:22:06.865Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6940abb2d9bcdf3f3d143143
Added to database: 12/16/2025, 12:45:38 AM
Last enriched: 12/23/2025, 1:34:11 AM
Last updated: 2/7/2026, 1:44:30 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.