File Exposure Vulnerability in S3Proxy by org.gaul
CVE-2025-24961
6MEDIUM
Key Information:
- Vendor
- Gaul
- Status
- S3proxy
- Vendor
- CVE Published:
- 3 February 2025
Summary
The S3Proxy by org.gaul implements the S3 API and facilitates the proxying of requests, which may inadvertently expose local files to users when utilizing the filesystem and filesystem-nio2 storage backends. To mitigate this risk, users are strongly urged to upgrade to version 2.6.0, as no known workarounds are available for this vulnerability.
Affected Version(s)
s3proxy < 2.6.0
References
CVSS V4
Score:
6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved