CVE-2025-49830
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-15

Last updated on: 2025-11-04

Assigner: GitHub, Inc.

Description
Conjur provides secrets management and application identity for infrastructure. An authenticated attacker who is able to load policy can use the policy yaml parser to reference files on the Secrets Manager, Self-Hosted server. These references may be used as reconnaissance to better understand the folder structure of the Secrets Manager/Conjur server or to have the yaml parser include files on the server in the yaml that is processed as the policy loads. This issue affects Secrets Manager, Self-Hosted (formerly Conjur Enterprise) prior to versions 13.5.1 and 13.6.1 and Conjur OSS prior to version 1.22.1. Conjur OSS version 1.22.1 and Secrets Manager, Self-Hosted versions 13.5.1 and 13.6.1 fix the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-15
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-07-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
cyberark conjur to 1.22.1 (exc)
cyberark conjur to 13.5.1 (exc)
cyberark conjur 13.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Conjur's Secrets Manager and Conjur OSS allows an authenticated attacker who can load policy to exploit the policy YAML parser to reference files on the Secrets Manager or Self-Hosted server. This can be used to perform reconnaissance to understand the folder structure or to include files from the server in the YAML processed as policy loads, potentially exposing sensitive information.


How can this vulnerability impact me? :

The vulnerability can allow an attacker with authentication and policy loading capabilities to gain insight into the server's file structure or include arbitrary files in policy processing. This could lead to unauthorized disclosure of sensitive information stored on the Secrets Manager or Conjur server, increasing the risk of data exposure or further attacks.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade Conjur OSS to version 1.22.1 or later, or Secrets Manager, Self-Hosted to versions 13.5.1 or 13.6.1 or later. These versions contain fixes for the issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart