Show plain JSON{"id": "CVE-2025-27142", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}], "cvssMetricV40": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"Safety": "NOT_DEFINED", "version": "4.0", "Recovery": "NOT_DEFINED", "baseScore": 6.3, "Automatable": "NOT_DEFINED", "attackVector": "ADJACENT", "baseSeverity": "MEDIUM", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "exploitMaturity": "UNREPORTED", "providerUrgency": "NOT_DEFINED", "userInteraction": "NONE", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "subIntegrityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "vulnAvailabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "subConfidentialityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED"}}]}, "published": "2025-02-25T20:15:37.847", "references": [{"url": "https://github.com/localsend/localsend/commit/e8635204ec782ded45bc7d698deb60f3c4105687", "tags": ["Patch"], "source": "security-advisories@github.com"}, {"url": "https://github.com/localsend/localsend/security/advisories/GHSA-f7jp-p6j4-3522", "tags": ["Vendor Advisory"], "source": "security-advisories@github.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "LocalSend is a free, open-source app that allows users to securely share files and messages with nearby devices over their local network without needing an internet connection. Prior to version 1.17.0, due to the missing sanitization of the path in the `POST /api/localsend/v2/prepare-upload` and the `POST /api/localsend/v2/upload` endpoint, a malicious file transfer request can write files to the arbitrary location on the system, resulting in the remote command execution. A malicious file transfer request sent by nearby devices can write files into an arbitrary directory. This usually allows command execution via the startup folder on Windows or Bash-related files on Linux. If the user enables the `Quick Save` feature, it will silently write files without explicit user interaction. Version 1.17.0 fixes this issue."}, {"lang": "es", "value": "LocalSend es una aplicaci\u00f3n gratuita de c\u00f3digo abierto que permite a los usuarios compartir archivos y mensajes de forma segura con dispositivos cercanos a trav\u00e9s de su red local sin necesidad de una conexi\u00f3n a Internet. Antes de la versi\u00f3n 1.17.0, debido a la falta de depuraci\u00f3n de la ruta en el endpoint `POST /api/localsend/v2/prepare-upload` y `POST /api/localsend/v2/upload`, una solicitud de transferencia de archivos maliciosa puede escribir archivos en una ubicaci\u00f3n arbitraria en el sistema, lo que da como resultado la ejecuci\u00f3n remota del comando. Una solicitud de transferencia de archivos maliciosa enviada por dispositivos cercanos puede escribir archivos en un directorio arbitrario. Esto generalmente permite la ejecuci\u00f3n de comandos a trav\u00e9s de la carpeta de inicio en Windows o archivos relacionados con Bash en Linux. Si el usuario habilita la funci\u00f3n `Guardado r\u00e1pido`, escribir\u00e1 archivos de forma silenciosa sin interacci\u00f3n expl\u00edcita del usuario. La versi\u00f3n 1.17.0 corrige este problema."}], "lastModified": "2025-02-28T13:35:22.340", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:localsend:localsend:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99B665EA-3DCE-4331-ACFE-C4A38FCF8D1B", "versionEndExcluding": "1.17.0"}], "operator": "OR"}]}], "sourceIdentifier": "security-advisories@github.com"}