CVE-2025-54798
BaseFortify
Publication date: 2025-08-07
Last updated on: 2025-11-03
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| raszi | tmp | to 0.2.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-59 | The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in tmp (a temporary file and directory creator for node.js) versions 0.2.3 and below allows an attacker to write arbitrary temporary files or directories via a symbolic link in the dir parameter. This means an attacker could potentially create or overwrite files in unintended locations by exploiting symbolic links. The issue is fixed in version 0.2.4.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with local access to write arbitrary files or directories by exploiting symbolic links, potentially leading to unauthorized modification of files. However, the CVSS score indicates a low severity impact with no confidentiality or availability impact, only a low integrity impact, and requires high attack complexity and low privileges.
What immediate steps should I take to mitigate this vulnerability?
Upgrade the tmp package to version 0.2.4 or later, as this version contains the fix for the arbitrary temporary file/directory write vulnerability via symbolic link dir parameter.