CVE-2025-66449: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in C4illin ConvertX
ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-66449 is a path traversal vulnerability classified under CWE-22, CWE-73, and CWE-434 affecting C4illin's ConvertX, a self-hosted online file converter. The vulnerability exists in versions prior to 0.16.0 within the /upload endpoint, which accepts a file upload request from authenticated users. The core issue is that the application directly uses the user-supplied file.name parameter without any sanitization or validation, allowing attackers to craft file paths that traverse directories and write files outside the intended upload directory. This arbitrary file write capability can be exploited to overwrite critical system binaries or application files, effectively enabling remote code execution with the privileges of the ConvertX service. The vulnerability does not require user interaction beyond authentication, and the attack surface is network-exposed since the service is self-hosted and accessible over HTTP/S. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction. The vendor has addressed the issue in version 0.16.0 by implementing proper input validation and sanitization of file paths to restrict file writes to authorized directories. No public exploits have been observed yet, but the vulnerability poses a significant risk if left unpatched, especially in environments where ConvertX is deployed with elevated privileges or on critical infrastructure.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to full system compromise of servers running vulnerable ConvertX versions. This could result in unauthorized access to sensitive data, disruption of file conversion services, and potential lateral movement within internal networks. Critical sectors such as finance, healthcare, and government agencies that rely on file conversion workflows may face operational downtime and data breaches. The ability to overwrite system binaries elevates the risk to complete system takeover, which could be leveraged for espionage, ransomware deployment, or sabotage. Given the self-hosted nature of ConvertX, organizations with less mature patch management or weaker authentication controls are particularly vulnerable. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation. Attackers targeting European entities could exploit this vulnerability to gain footholds in networks, especially where ConvertX is integrated into automated document processing pipelines.
Mitigation Recommendations
European organizations should immediately upgrade ConvertX installations to version 0.16.0 or later to apply the official patch. Until upgrades are completed, restrict access to the /upload endpoint using network segmentation and firewall rules to limit exposure to trusted users only. Implement strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of credential compromise. Conduct thorough audits of file upload logs to detect suspicious file names or unauthorized file writes. Employ host-based intrusion detection systems (HIDS) to monitor critical system binaries for unauthorized changes. Additionally, apply application-layer input validation and sanitization as an extra defense layer if upgrading is delayed. Regularly back up critical data and system configurations to enable recovery in case of compromise. Finally, educate administrators and users about the risks of uploading files with malicious names and enforce the principle of least privilege for the ConvertX service account to limit potential damage.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-66449: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in C4illin ConvertX
Description
ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-66449 is a path traversal vulnerability classified under CWE-22, CWE-73, and CWE-434 affecting C4illin's ConvertX, a self-hosted online file converter. The vulnerability exists in versions prior to 0.16.0 within the /upload endpoint, which accepts a file upload request from authenticated users. The core issue is that the application directly uses the user-supplied file.name parameter without any sanitization or validation, allowing attackers to craft file paths that traverse directories and write files outside the intended upload directory. This arbitrary file write capability can be exploited to overwrite critical system binaries or application files, effectively enabling remote code execution with the privileges of the ConvertX service. The vulnerability does not require user interaction beyond authentication, and the attack surface is network-exposed since the service is self-hosted and accessible over HTTP/S. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction. The vendor has addressed the issue in version 0.16.0 by implementing proper input validation and sanitization of file paths to restrict file writes to authorized directories. No public exploits have been observed yet, but the vulnerability poses a significant risk if left unpatched, especially in environments where ConvertX is deployed with elevated privileges or on critical infrastructure.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to full system compromise of servers running vulnerable ConvertX versions. This could result in unauthorized access to sensitive data, disruption of file conversion services, and potential lateral movement within internal networks. Critical sectors such as finance, healthcare, and government agencies that rely on file conversion workflows may face operational downtime and data breaches. The ability to overwrite system binaries elevates the risk to complete system takeover, which could be leveraged for espionage, ransomware deployment, or sabotage. Given the self-hosted nature of ConvertX, organizations with less mature patch management or weaker authentication controls are particularly vulnerable. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation. Attackers targeting European entities could exploit this vulnerability to gain footholds in networks, especially where ConvertX is integrated into automated document processing pipelines.
Mitigation Recommendations
European organizations should immediately upgrade ConvertX installations to version 0.16.0 or later to apply the official patch. Until upgrades are completed, restrict access to the /upload endpoint using network segmentation and firewall rules to limit exposure to trusted users only. Implement strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of credential compromise. Conduct thorough audits of file upload logs to detect suspicious file names or unauthorized file writes. Employ host-based intrusion detection systems (HIDS) to monitor critical system binaries for unauthorized changes. Additionally, apply application-layer input validation and sanitization as an extra defense layer if upgrading is delayed. Regularly back up critical data and system configurations to enable recovery in case of compromise. Finally, educate administrators and users about the risks of uploading files with malicious names and enforce the principle of least privilege for the ConvertX service account to limit potential damage.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-01T18:22:06.865Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6940abb2d9bcdf3f3d143143
Added to database: 12/16/2025, 12:45:38 AM
Last enriched: 12/16/2025, 1:01:12 AM
Last updated: 12/18/2025, 12:28:38 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14837: Code Injection in ZZCMS
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumCVE-2025-14834: SQL Injection in code-projects Simple Stock System
MediumCVE-2025-68435: CWE-305: Authentication Bypass by Primary Weakness in nicotsx zerobyte
CriticalCVE-2025-68433: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in zed-industries zed
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.