RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch.
CVSS
No CVSS.
References
Configurations
No configuration.
History
18 Jul 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/rommapp/romm/security/advisories/GHSA-fx9g-xw4j-jwc3 - |
17 Jul 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
16 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-16 20:15
Updated : 2025-07-18 15:15
NVD link : CVE-2025-53908
Mitre link : CVE-2025-53908
CVE.ORG link : CVE-2025-53908
JSON object : View
Products Affected
No product.
CWE
CWE-26
Path Traversal: '/dir/../filename'