Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 08:15:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Wed, 27 Aug 2025 05:30:00 +0900

Type Values Removed Values Added
Weaknesses CWE-22

Wed, 30 Jul 2025 11:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.59563}

epss

{'score': 0.57587}


Sat, 12 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.54896}

epss

{'score': 0.59563}


Thu, 22 May 2025 05:45:00 +0900

Type Values Removed Values Added
First Time appeared Srimax
Srimax output Messenger
CPEs cpe:2.3:a:srimax:output_messenger:*:*:*:*:*:*:*:*
Vendors & Products Srimax
Srimax output Messenger

Tue, 20 May 2025 08:15:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-05-19'}


Tue, 20 May 2025 04:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 May 2025 04:00:00 +0900

Type Values Removed Values Added
Weaknesses CWE-24
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Tue, 20 May 2025 03:30:00 +0900


Tue, 06 May 2025 01:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 06 May 2025 00:45:00 +0900

Type Values Removed Values Added
Description Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T22:55:17.487Z

Reserved: 2025-03-10T00:00:00.000Z

Link: CVE-2025-27920

cve-icon Vulnrichment

Updated: 2025-05-05T16:02:19.891Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-05T16:15:50.857

Modified: 2025-11-05T19:28:43.010

Link: CVE-2025-27920

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses