CVE-2025-27410 – PwnDoc Path Traversal Remote Code Execution

The following table lists the changes that have been made to the
CVE-2025-27410 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Feb. 28, 2025

    Action Type Old Value New Value
    Added Description PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry’s name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue.
    Added CVSS V3.1 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
    Added CWE CWE-22
    Added CWE CWE-23
    Added Reference https://github.com/pwndoc/pwndoc/blob/14acb704891245bf1703ce6296d62112e85aa995/backend/src/routes/backup.js#L527
    Added Reference https://github.com/pwndoc/pwndoc/commit/98f284291d73d3a0b11d3181d845845c192d1080
    Added Reference https://github.com/pwndoc/pwndoc/releases/tag/v1.2.0
    Added Reference https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx
Share the Post:

Related Posts