CVE-2025-65952
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-25

Last updated on: 2025-11-25

Assigner: GitHub, Inc.

Description
Console is a network used to control Gorilla Tag mods' users and other users on the network. Prior to version 2.8.0, a path traversal vulnerability exists where complicated combinations of backslashes and periods can be used to escape the Gorilla Tag path and write to unwanted directories. This issue has been patched in version 2.8.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-25
Last Modified
2025-11-25
Generated
2026-05-07
AI Q&A
2025-11-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gorillatag gorillatag *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a path traversal issue in the Console network used to control Gorilla Tag mods and users. Before version 2.8.0, attackers could use complex combinations of backslashes and periods to escape the intended Gorilla Tag directory path and write files to unauthorized directories on the system. This could allow unauthorized modification of files outside the intended scope.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to write files to unintended directories on the system, potentially leading to unauthorized data modification, system compromise, or disruption of normal operations. This could result in loss of data integrity or availability.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the Console software to version 2.8.0 or later, as this version contains the patch that fixes the path traversal vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart