Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69194: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

0
High
VulnerabilityCVE-2025-69194cvecve-2025-69194
Published: Fri Jan 09 2026 (01/09/2026, 07:53:48 UTC)
Source: CVE Database V5

Description

CVE-2025-69194 is a high-severity path traversal vulnerability in GNU Wget2 affecting the handling of Metalink documents. The flaw allows attackers to craft malicious Metalink <file name> elements that bypass pathname restrictions, enabling arbitrary file writes outside intended directories. Exploitation requires user interaction but no privileges and can lead to full compromise through data loss or further system control. The vulnerability has a CVSS score of 8. 8, reflecting its critical impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. European organizations using GNU Wget2, especially in software distribution or automated download contexts, are at risk. Mitigation involves applying patches once available and implementing strict input validation and sandboxing when processing Metalink files. Countries with significant open-source usage and critical infrastructure relying on GNU tools, such as Germany, France, and the Netherlands, are most likely affected.

AI-Powered Analysis

AILast updated: 01/16/2026, 09:54:56 UTC

Technical Analysis

CVE-2025-69194 is a path traversal vulnerability identified in GNU Wget2, specifically in the way it processes Metalink documents. Metalink files provide metadata for downloading multiple files, including their names and locations. The vulnerability arises because Wget2 fails to properly validate the <file name> elements within these Metalink files, allowing an attacker to specify file paths that traverse directories (e.g., using '../') and write files outside the intended download directory. This improper limitation of pathname can lead to arbitrary file writes on the victim system. Since Wget2 is often used in automated download scenarios, an attacker who can trick a user or system into processing a malicious Metalink file can cause data loss or overwrite critical files, potentially leading to privilege escalation or system compromise. The CVSS 3.1 score of 8.8 indicates a high severity, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but user interaction needed (UI:R). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits are currently known in the wild, the vulnerability's nature and severity make it a significant threat once weaponized. The vulnerability was published on January 9, 2026, and no official patches or mitigations have been linked yet, emphasizing the need for proactive defensive measures.

Potential Impact

For European organizations, the impact of CVE-2025-69194 can be substantial. Many enterprises and public sector entities rely on GNU Wget2 for automated downloads, software updates, and data retrieval, especially in Linux-based environments. Exploitation could lead to unauthorized file writes, resulting in data corruption, loss of critical configuration files, or insertion of malicious payloads. This can disrupt business operations, compromise sensitive data, and facilitate further attacks such as privilege escalation or lateral movement within networks. Critical infrastructure sectors, including energy, finance, and government, which often use open-source tools extensively, could face operational outages or breaches. The requirement for user interaction means phishing or social engineering could be vectors to trigger the exploit, increasing risk in environments with less stringent user training or controls. The high CVSS score underscores the potential for widespread damage if exploited at scale.

Mitigation Recommendations

1. Monitor official GNU Wget2 repositories and security advisories closely for patches addressing CVE-2025-69194 and apply them immediately upon release. 2. Until patches are available, restrict or disable the processing of Metalink files in Wget2 where feasible, especially in automated workflows. 3. Implement strict input validation and sanitization for any Metalink files processed, ensuring file paths do not contain directory traversal sequences or absolute paths. 4. Use sandboxing or containerization to isolate Wget2 processes, limiting the impact of any arbitrary file writes. 5. Educate users and administrators about the risks of opening or processing untrusted Metalink files, emphasizing caution with files from unknown sources. 6. Employ endpoint detection and response (EDR) tools to monitor for suspicious file writes or modifications in directories commonly targeted by Wget2. 7. Review and harden file system permissions to minimize the ability of Wget2 to write outside designated directories. 8. Consider network-level controls to block or flag downloads of suspicious Metalink files from untrusted sources.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2025-12-29T13:49:33.180Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960b4b3ecefc3cd7c10677e

Added to database: 1/9/2026, 7:56:35 AM

Last enriched: 1/16/2026, 9:54:56 AM

Last updated: 2/7/2026, 8:25:07 AM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats