Bug 2375281 (CVE-2025-6776) - CVE-2025-6776 xiaoyunjie openvpn-cms-flask File Upload controller.py upload path traversal
Summary: CVE-2025-6776 xiaoyunjie openvpn-cms-flask File Upload controller.py upload p...
Keywords:
Status: NEW
Alias: CVE-2025-6776
Product: Security Response
Classification: Other
Component: vulnerability-draft
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-27 21:01 UTC by OSIDB Bzimport
Modified: 2025-06-27 21:01 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-06-27 21:01:18 UTC
A vulnerability classified as critical was found in xiaoyunjie openvpn-cms-flask up to 1.2.7. This vulnerability affects the function Upload of the file app/plugins/oss/app/controller.py of the component File Upload. The manipulation of the argument image leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.2.8 is able to address this issue. The name of the patch is e23559b98c8ea2957f09978c29f4e512ba789eb6. It is recommended to upgrade the affected component.


Note You need to log in before you can comment on or make changes to this bug.