Plattform
other
Komponente
im-server
Behoben in
1.4.4
CVE-2025-66480 is a critical directory traversal vulnerability affecting Wildfire IM Server versions up to 1.4.3. This flaw resides within the file upload functionality, allowing attackers to potentially access sensitive files on the server. The vulnerability stems from insufficient sanitization of filenames during the upload process. A patch is available in version 1.4.3.
The vulnerability lies in the writeFileUploadData method within the com.xiaoleilu.loServer.action.UploadFileAction component. The application fails to properly sanitize filenames during file uploads, directly concatenating the configured storage directory with user-supplied filenames without removing directory traversal sequences like ../. This allows an attacker to craft a malicious filename that points outside the intended upload directory, potentially accessing system files, configuration data, or other sensitive information. The blast radius extends to any data stored on the server accessible by the application process. Exploitation could lead to complete system compromise if the attacker gains access to credentials or other critical system files.
This vulnerability is considered high risk due to its CRITICAL CVSS score and the ease of exploitation. Public proof-of-concept exploits are likely to emerge given the straightforward nature of the flaw. While no active exploitation campaigns have been publicly confirmed as of the publication date, the vulnerability's severity warrants immediate attention. It was published on 2026-02-02.
Organizations using Wildfire IM Server in production environments, particularly those with publicly accessible file upload endpoints, are at risk. Environments with limited security controls or inadequate input validation are especially vulnerable. Shared hosting environments where multiple users share the same server instance could also be affected, as a compromised user account could potentially be used to exploit this vulnerability.
• linux / server: Monitor access logs for requests containing ../ sequences in the filename parameter during file uploads. Use grep to search for patterns like /fs?file=../ in the access logs.
grep '/fs?file=../' /var/log/apache2/access.log• generic web: Use curl to attempt a file upload with a malicious filename and observe the server's response. Check for unexpected file access or errors.
curl -F "file=../../../../etc/passwd;" http://your-wildfire-server/fs• generic web: Examine the server's file system for unexpected files appearing outside of the intended upload directory. Use file system auditing tools to track file creation and modification events.
disclosure
Exploit-Status
EPSS
0.25% (48% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation is to upgrade Wildfire IM Server to version 1.4.3 or later, which contains the fix for this vulnerability. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests containing directory traversal sequences in the filename parameter. Additionally, restrict file upload permissions to the minimum necessary and implement strict input validation on all user-supplied data. Regularly review and audit file upload configurations to prevent future vulnerabilities. After upgrade, confirm the fix by attempting a file upload with a malicious filename containing directory traversal sequences; the upload should be rejected.
Aktualisieren Sie Wildfire IM Server auf Version 1.4.3 oder höher. Diese Version enthält die Korrektur für die Schwachstelle des Uploads beliebiger Dateien über Directory Traversal. Das Update verhindert die Remote Code Execution auf dem Server.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-66480 is a critical vulnerability in Wildfire IM Server versions up to 1.4.3 that allows attackers to read arbitrary files by manipulating file uploads.
You are affected if you are running Wildfire IM Server versions prior to 1.4.3 and have not yet applied the patch.
Upgrade Wildfire IM Server to version 1.4.3 or later. As a temporary workaround, restrict file upload access and implement strict filename validation.
While no public exploits are currently known, the ease of exploitation makes it a potential target for attackers.
Refer to the vendor's security advisory for Wildfire IM Server, which should be available on their official website or security mailing list.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.