Platform
python
Component
dosage
Fixed in
3.2.1
3.2
CVE-2025-64184 describes a Directory Traversal vulnerability discovered in Dosage, a comic server written in Python. This flaw allows attackers to potentially write arbitrary files outside the intended directory, leading to potential system compromise. The vulnerability affects versions of Dosage prior to 3.1, and a fix is available in version 3.2.
The core of the vulnerability lies in how Dosage constructs filenames when downloading comic images. While the basename is sanitized, the file extension is derived from the HTTP Content-Type header. A malicious actor, or a Man-in-the-Middle attacker intercepting HTTP traffic, can exploit this by crafting a response with a manipulated Content-Type header. This allows them to specify an arbitrary file extension and, under certain conditions, write files to locations outside the designated target directory. Successful exploitation could lead to overwriting critical system files, executing arbitrary code, or gaining unauthorized access to sensitive data. The blast radius depends on the permissions of the Dosage process and the server's overall security posture.
This vulnerability was publicly disclosed on 2025-11-04. There are currently no known public exploits or active campaigns targeting CVE-2025-64184. The vulnerability is not listed on the CISA KEV catalog at the time of writing. The ease of exploitation, particularly with a Man-in-the-Middle attack, warrants careful attention and prompt remediation.
Exploit Status
EPSS
0.20% (42% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2025-64184 is to upgrade Dosage to version 3.2 or later, which includes a fix for the file extension handling. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) or reverse proxy to filter HTTP Content-Type headers and prevent the injection of malicious values. Additionally, restrict file write permissions for the Dosage process to the minimum necessary. Monitor web server access logs for unusual file creation attempts or unexpected file extensions. The fix is described as small and self-contained, suggesting a relatively straightforward deployment.
Actualice Dosage a la versión 3.2 o superior. Esta versión corrige la vulnerabilidad de path traversal al validar correctamente la extensión del archivo basada en el contenido en lugar de la cabecera HTTP Content-Type. Esto evitará que un atacante escriba archivos fuera del directorio deseado.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-64184 is a Directory Traversal vulnerability in Dosage Comic Server versions 3.1 and earlier, allowing attackers to potentially write arbitrary files outside the intended directory by manipulating HTTP Content-Type headers.
You are affected if you are running Dosage Comic Server version 3.1 or earlier. Upgrade to version 3.2 or later to mitigate the vulnerability.
Upgrade Dosage Comic Server to version 3.2 or later. As an interim measure, implement a WAF or proxy to filter HTTP Content-Type headers.
As of the current assessment, there are no known public exploits or active campaigns targeting CVE-2025-64184.
Refer to the official Dosage GitHub repository for updates and advisories: https://github.com/webcomics/dosage
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.