CVE-2025-35430
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-10-08
Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisa | thorium | From 1.0.0 (inc) to 1.1.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in CISA Thorium occurs because the software does not properly validate the paths of files downloaded using the 'download_ephemeral' and 'download_children' functions. This flaw allows a remote, authenticated attacker to access arbitrary files on the system, limited only by the file system permissions.
How can this vulnerability impact me? :
The vulnerability can allow an attacker with valid authentication to access arbitrary files on the affected system. This could lead to unauthorized disclosure of sensitive information or data leakage, depending on the permissions of the files accessed.
What immediate steps should I take to mitigate this vulnerability?
Update CISA Thorium to version 1.1.2 or later, where the vulnerability is fixed.