File Exposure Vulnerability in S3Proxy by org.gaul
CVE-2025-24961

6MEDIUM

Key Information:

Vendor
Gaul
Status
S3proxy
Vendor
CVE Published:
3 February 2025

Summary

The S3Proxy by org.gaul implements the S3 API and facilitates the proxying of requests, which may inadvertently expose local files to users when utilizing the filesystem and filesystem-nio2 storage backends. To mitigate this risk, users are strongly urged to upgrade to version 2.6.0, as no known workarounds are available for this vulnerability.

Affected Version(s)

s3proxy < 2.6.0

References

CVSS V4

Score:
6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.