CVE-2025-67030
🟡 Monitoruj
Wykorzystanie podatności Directory Traversal w plexus-utils umożliwia zdalne wykonanie kodu.
CVSS
8.8
EPSS
0.3%
Exploit
none
Vendor
codehaus-plexus
Opis źródłowy (NVD)
Directory Traversal vulnerability in the extractFile method of org.codehaus.plexus.util.Expand in plexus-utils before 6d780b3378829318ba5c2d29547e0012d5b29642. This allows an attacker to execute arbitrary code
path-traversal
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.3% |
| Opublikowano (NVD) | 2026-03-25 18:16:25 UTC |
| Ostatnia modyfikacja (NVD) | 2026-05-01 17:12:22 UTC |
Referencje
- https://gist.github.com/weaver4VD/3216dac645220f8c9b488362f61241ec (cve@mitre.org) [Third Party Advisory]
- https://github.com/codehaus-plexus/plexus-utils/commit/6d780b3378829318ba5c2d29547e0012d5b29642 (cve@mitre.org) [Patch]
- https://github.com/codehaus-plexus/plexus-utils/issues/294 (cve@mitre.org) [Issue Tracking]
- https://github.com/codehaus-plexus/plexus-utils/pull/295 (cve@mitre.org) [Issue Tracking, Patch]
- https://github.com/codehaus-plexus/plexus-utils/pull/296 (cve@mitre.org) [Issue Tracking, Patch]