Path Traversal Vulnerability in Upsonic File Handling
CVE-2025-6278
Key Information:
Badges
What is CVE-2025-6278?
A significant path traversal vulnerability has been identified in the Upsonic application, specifically impacting versions up to 0.55.6. The vulnerability arises from improper handling of file paths in the function os.path.join within markdown/server.py. This flaw allows an attacker to manipulate the file.filename argument, potentially leading to unauthorized access to the server's filesystem. Given its public disclosure, immediate action is recommended to mitigate potential exploitation. For detailed technical analysis, refer to the relevant advisories and issue tracking links.
Affected Version(s)
Upsonic 0.55.0
Upsonic 0.55.1
Upsonic 0.55.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved