Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66480: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wildfirechat im-server

0
Critical
VulnerabilityCVE-2025-66480cvecve-2025-66480cwe-22cwe-434
Published: Mon Feb 02 2026 (02/02/2026, 21:33:23 UTC)
Source: CVE Database V5
Vendor/Project: wildfirechat
Product: im-server

Description

Wildfire IM is an instant messaging and real-time audio/video solution. Prior to 1.4.3, a critical vulnerability exists in the im-server component related to the file upload functionality found in com.xiaoleilu.loServer.action.UploadFileAction. The application exposes an endpoint (/fs) that handles multipart file uploads but fails to properly sanitize the filename provided by the user. Specifically, the writeFileUploadData method directly concatenates the configured storage directory with the filename extracted from the upload request without stripping directory traversal sequences (e.g., ../../). This vulnerability allows an attacker to write arbitrary files to any location on the server's filesystem where the application process has write permissions. By uploading malicious files (such as scripts, executables, or overwriting configuration files like authorized_keys or cron jobs), an attacker can achieve Remote Code Execution (RCE) and completely compromise the server. This vulnerability is fixed in 1.4.3.

AI-Powered Analysis

AILast updated: 02/02/2026, 23:44:28 UTC

Technical Analysis

CVE-2025-66480 is a critical security vulnerability affecting the wildfirechat im-server component prior to version 1.4.3. The flaw exists in the file upload functionality, specifically within the com.xiaoleilu.loServer.action.UploadFileAction class. The server exposes an endpoint (/fs) that accepts multipart file uploads but fails to properly sanitize the filename parameter. The vulnerable method, writeFileUploadData, concatenates the configured storage directory path with the user-supplied filename without removing directory traversal sequences such as "../". This improper limitation of a pathname to a restricted directory (CWE-22) allows attackers to traverse directories and write files outside the intended storage area. By exploiting this, an attacker can upload arbitrary files to any location on the server where the application process has write permissions. This includes critical system directories or user home directories, enabling overwriting of configuration files like authorized_keys or cron jobs. Such actions can lead to remote code execution (RCE), complete server compromise, and persistent backdoors. The vulnerability is rated critical with a CVSS 3.1 base score of 9.8, reflecting its high impact on confidentiality, integrity, and availability, ease of exploitation (network vector, no privileges or user interaction needed), and broad scope. Although no public exploits are currently known, the severity and simplicity of exploitation make this a high-priority issue. The vendor fixed the vulnerability in version 1.4.3 by properly sanitizing filenames and restricting file write locations.

Potential Impact

For European organizations, exploitation of CVE-2025-66480 could result in full compromise of wildfirechat im-server instances, leading to unauthorized access to sensitive communications, data exfiltration, and lateral movement within networks. Given wildfirechat's role in instant messaging and real-time audio/video communications, attackers could intercept or manipulate business-critical conversations, impacting confidentiality and operational integrity. The ability to execute arbitrary code remotely can also facilitate deployment of ransomware, espionage tools, or persistent malware. This poses significant risks to sectors reliant on secure communications, such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators across Europe. The disruption or compromise of these services could have cascading effects on business continuity and national security. Additionally, the vulnerability's network-exploitable nature means attackers can target exposed servers directly without authentication, increasing the attack surface. Organizations failing to patch promptly may face regulatory penalties under GDPR due to inadequate protection of personal data processed via the platform.

Mitigation Recommendations

European organizations using wildfirechat im-server should immediately upgrade to version 1.4.3 or later, where the vulnerability is fixed. If upgrading is not immediately feasible, implement strict network-level controls to restrict access to the /fs upload endpoint, such as IP whitelisting, VPN-only access, or web application firewalls with custom rules to detect and block directory traversal patterns in upload requests. Conduct thorough audits of existing server files for unauthorized changes or suspicious files, especially in critical directories. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) tools to monitor for anomalous file writes or process executions. Review and harden file system permissions to minimize the write capabilities of the im-server process, limiting potential damage scope. Regularly back up server configurations and data to enable recovery from compromise. Finally, educate development and operations teams on secure file upload handling and input validation best practices to prevent similar issues in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-02T17:09:52.016Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813002f9fa50a62f63a04e

Added to database: 2/2/2026, 11:15:14 PM

Last enriched: 2/2/2026, 11:44:28 PM

Last updated: 2/7/2026, 12:49:19 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats