Output Messenger <2.0.63: Dir Traversal via Improper File Path
CVE-2025-27920 Published on May 5, 2025

Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.

NVD

Known Exploited Vulnerability

This Srimax Output Messenger Directory Traversal Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Srimax Output Messenger contains a directory traversal vulnerability that allows an attacker to access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.

The following remediation steps are recommended / required by June 9, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weakness Type

Path Traversal: '../filedir'

The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "../" sequences that can resolve to a location that is outside of that directory.


Products Associated with CVE-2025-27920

Want to know whenever a new CVE is published for Srimax Output Messenger? stack.watch will email you.

 

Affected Versions

Srimax Output Messenger:

Exploit Probability

EPSS
50.15%
Percentile
97.85%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.