CVE-2025-3051 – Linux::Statm::Tiny Remote Code Execution Vulnerability

The following table lists the changes that have been made to the
CVE-2025-3051 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by 9b29abf9-4ab0-4765-b253-1875cd9b441e

    Apr. 01, 2025

    Action Type Old Value New Value
    Added Description Linux::Statm::Tiny for Perl before 0.0701 allows untrusted code from the current working directory (‘.’) to be loaded similar to CVE-2016-1238.

    If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution.

    Linux::Statm::Tiny uses Mite to produce the affected code section due to CVE-2025-30672

    Added CWE CWE-427
    Added Reference https://blogs.perl.org/users/todd_rinaldo/2016/11/what-happened-to-dot-in-inc.html
    Added Reference https://metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0700/source/lib/Linux/Statm/Tiny/Mite.pm#L82
    Added Reference https://metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0701/changes
Share the Post:

Related Posts