CVE-2025-27920

Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:srimax:output_messenger:*:*:*:*:*:*:*:*

History

21 Oct 2025, 23:16

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27920 -

21 Oct 2025, 20:20

Type Values Removed Values Added
References
  • {'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27920', 'source': '134c704f-9b21-4f2e-91b3-4a467353bcc0'}

21 Oct 2025, 19:21

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27920 -

26 Aug 2025, 20:15

Type Values Removed Values Added
CWE CWE-22

21 May 2025, 19:40

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-05 16:15

Updated : 2025-10-21 23:16


NVD link : CVE-2025-27920

Mitre link : CVE-2025-27920

CVE.ORG link : CVE-2025-27920


JSON object : View

Products Affected

srimax

  • output_messenger
CWE
CWE-24

Path Traversal: '../filedir'