Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-69194

Опубликовано: 29 дек. 2025
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user’s environment.

Отчет

This vulnerability is rated Important for Red Hat, as it allows a remote attacker to overwrite arbitrary files within the permissions of the user running wget2. While user interaction is required to process the Metalink file, exploitation can plausibly lead to loss of data or local code execution. The root cause is insufficient validation of file paths supplied via Metalink metadata.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2425773wget2: Arbitrary File Write via Metalink Path Traversal in GNU Wget2

EPSS

Процентиль: 7%
0.00027
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
3 месяца назад

A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user’s environment.

CVSS3: 8.8
nvd
3 месяца назад

A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user’s environment.

CVSS3: 8.8
msrc
3 месяца назад

Wget2: arbitrary file write via metalink path traversal in gnu wget2

CVSS3: 8.8
debian
3 месяца назад

A security issue was discovered in GNU Wget2 when handling Metalink do ...

CVSS3: 8.8
github
3 месяца назад

A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user’s environment.

EPSS

Процентиль: 7%
0.00027
Низкий

8.8 High

CVSS3