Cybersecurity researchers have disclosed three safety flaws within the Rack Ruby internet server interface that, if efficiently exploited, might allow attackers to realize unauthorized entry to recordsdata, inject malicious knowledge, and tamper with logs underneath sure circumstances.
The vulnerabilities, flagged by cybersecurity vendor OPSWAT, are listed beneath –
- CVE-2025-27610 (CVSS rating: 7.5) – A path traversal vulnerability that may very well be used to realize entry to all recordsdata underneath the desired root: listing, assuming an attacker can decide the paths to these recordsdata
- CVE-2025-27111 (CVSS rating: 6.9) – An improper neutralization of carriage return line feeds (CRLF) sequences and improper output neutralization for logs vulnerability that may very well be used to control log entries and warp log recordsdata
- CVE-2025-25184 (CVSS rating: 5.7) – An improper neutralization of carriage return line feeds (CRLF) sequences and improper output neutralization for logs vulnerability that may very well be used to control log entries and inject malicious knowledge
Profitable exploitation of the issues might allow an attacker to obscure assault traces, learn arbitrary recordsdata, and inject malicious code.
“Amongst these vulnerabilities, CVE-2025-27610 is especially extreme, because it might allow unauthenticated attackers to retrieve delicate info, together with configuration recordsdata, credentials, and confidential knowledge, thereby resulting in knowledge breaches,” OPSWAT stated in a report shared with The Hacker Information.
The shortcoming stems from the truth that Rack::Static, a middleware that is used to serve static content material like JavaScript, stylesheets, and pictures, doesn’t sanitize user-supplied paths earlier than serving recordsdata, resulting in a state of affairs the place an attacker can present a specifically crafted path to entry recordsdata outdoors of the static file listing.
“Particularly, when the :root parameter is just not explicitly outlined, Rack defaults this worth to the present working listing by assigning it the worth of Dir.pwd, implicitly designating it as the online root listing for the Rack utility,” OPSWAT stated.
In consequence, if the :root possibility is both undefined or misconfigured relative to the :urls possibility, an unauthenticated attacker might weaponize CVE-2025-27610 via path traversal methods to entry delicate recordsdata outdoors the meant internet listing.
To mitigate the chance posed by the flaw, it is suggested to replace to the newest model. If quick patching is just not an possibility, it is beneficial to take away utilization of Rack::Static, or be certain that root: factors at a listing path that solely incorporates recordsdata that ought to be accessed publicly.
Essential Flaw in Infodraw Media Relay Service
The disclosure comes as a essential safety defect has been unearthed within the Infodraw Media Relay Service (MRS) that enables studying or deletion of arbitrary recordsdata through a path traversal vulnerability (CVE-2025-43928, CVSS rating: 9.8) within the username parameter within the login web page of the system.
Infodraw is an Israeli maker of cellular video surveillance options which might be used to transmit audio, video, and GPS knowledge over telecommunications networks. Based on the firm’s web site, its units are utilized by legislation enforcement, non-public investigations, fleet administration, and public transport in lots of international locations.
“A trivial Path Traversal vulnerability permits it to learn out any file from techniques for unauthenticated attackers,” safety researcher Tim Philipp Schäfers stated in an announcement shared with The Hacker Information. “Moreover an ‘Arbitrary File Deletion Vulnerability’ exists that enables attackers to delete any file from the system.”
The flaw, which permits login with a username like “../../../../,” impacts each Home windows and Linux variations of MRS. That stated, the safety defect continues to stay unpatched. Weak techniques in Belgium and Luxembourg have been taken offline following accountable disclosure.
“Affected organizations are primarily suggested to take the appliance offline instantly (since, regardless of early warnings, no producer patch is offered, and it’s thought of attainable that the vulnerability might be exploited by malicious actors within the close to future),” Philipp Schäfers stated.
“If this isn’t attainable, techniques ought to be additional protected with further measures (corresponding to utilizing a VPN or particular IP unlocking).”