CVE-2025-59352

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the gRPC API and HTTP APIs allow peers to send requests that force the recipient peer to create files in arbitrary file system locations, and to read arbitrary files. This allows peers to steal other peers’ secret data and to gain remote code execution (RCE) capabilities on the peer’s machine.This vulnerability is fixed in 2.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*

History

18 Sep 2025, 20:09

Type Values Removed Values Added
CPE cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Linuxfoundation dragonfly
Linuxfoundation
References () https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf - () https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf - Product
References () https://github.com/dragonflyoss/dragonfly/security/advisories/GHSA-79hx-3fp8-hj66 - () https://github.com/dragonflyoss/dragonfly/security/advisories/GHSA-79hx-3fp8-hj66 - Patch, Third Party Advisory

17 Sep 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-17 20:15

Updated : 2025-09-18 20:09


NVD link : CVE-2025-59352

Mitre link : CVE-2025-59352

CVE.ORG link : CVE-2025-59352


JSON object : View

Products Affected

linuxfoundation

  • dragonfly
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-202

Exposure of Sensitive Information Through Data Queries