Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66687: n/a

0
Unknown
VulnerabilityCVE-2025-66687cvecve-2025-66687
Published: Mon Mar 16 2026 (03/16/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Doom Launcher 3.8.1.0 is vulnerable to Directory Traversal due to missing file path validation during the extraction of game files

AI-Powered Analysis

AILast updated: 03/16/2026, 17:36:44 UTC

Technical Analysis

CVE-2025-66687 identifies a directory traversal vulnerability in Doom Launcher version 3.8.1.0, a software used to manage and launch Doom game files. The vulnerability stems from the software's failure to properly validate file paths during the extraction process of game files. Specifically, when extracting compressed or packaged game files, the launcher does not sanitize or restrict file paths, allowing an attacker to craft malicious archive files containing path traversal sequences (e.g., '../') that can cause files to be written outside the intended extraction directory. This can lead to overwriting critical system or application files, potentially allowing arbitrary code execution or privilege escalation if the launcher runs with elevated permissions. The vulnerability does not require prior authentication but does require the attacker to convince a user to extract a maliciously crafted game file, implying some level of user interaction. No CVSS score has been assigned yet, and no patches or known exploits have been reported as of the publication date. The lack of file path validation is a common security oversight that can have severe consequences, especially if the launcher runs with high privileges or if the overwritten files are executed by the system or other applications. The vulnerability highlights the importance of secure handling of file extraction and input validation in software that processes external content.

Potential Impact

The primary impact of this vulnerability is the potential for arbitrary file overwrite on affected systems, which can lead to several severe consequences. Attackers could overwrite critical system files, configuration files, or executable binaries, resulting in system instability, denial of service, or privilege escalation. If exploited, this could allow remote code execution, enabling attackers to take full control of the affected machine. For organizations, this poses risks including data breaches, disruption of operations, and potential lateral movement within networks if compromised hosts are connected to corporate environments. The impact is particularly significant in environments where Doom Launcher is used on shared or enterprise systems, or where users have administrative privileges. Although no exploits are currently known in the wild, the vulnerability's nature makes it a high-risk target for attackers once weaponized. The absence of a patch increases exposure time, emphasizing the need for proactive mitigation.

Mitigation Recommendations

To mitigate this vulnerability, users and organizations should implement several specific measures beyond generic advice: 1) Immediately restrict the permissions of the Doom Launcher application to run with the least privileges necessary, avoiding administrative or system-level rights. 2) Implement application whitelisting and file integrity monitoring on systems running Doom Launcher to detect unauthorized file modifications. 3) Educate users to avoid extracting game files from untrusted or unknown sources to reduce the risk of malicious archive files. 4) Use sandboxing or containerization techniques to isolate the launcher and its file extraction processes, limiting the potential impact of exploitation. 5) Monitor official Doom Launcher channels for security updates or patches and apply them promptly once available. 6) Employ endpoint detection and response (EDR) solutions to detect suspicious file system activity indicative of exploitation attempts. 7) Network segmentation can help contain potential breaches originating from compromised gaming systems. These targeted steps help reduce the attack surface and limit the damage if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b83bfc9d4df4518377219a

Added to database: 3/16/2026, 5:21:00 PM

Last enriched: 3/16/2026, 5:36:44 PM

Last updated: 3/16/2026, 7:24:09 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses