Cyber Posture

CVE-2025-27142

High

Published: 25 February 2025

Published
25 February 2025
Modified
28 February 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0465 89.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-27142 is a high-severity Path Traversal (CWE-22) vulnerability in Localsend Localsend. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked in the top 10.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates validation and sanitization of path parameters in the prepare-upload and upload endpoints to block path traversal sequences leading to arbitrary file writes.

prevent

Requires timely flaw remediation through patching to version 1.17.0, which implements proper path sanitization to eliminate the vulnerability.

prevent

Enforces least functionality by disabling non-essential features like Quick Save, preventing silent arbitrary file writes without user interaction.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1547.001 Registry Run Keys / Startup Folder Persistence
Adversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key.
T1546.004 Unix Shell Configuration Modification Privilege Escalation
Adversaries may establish persistence through executing malicious commands triggered by a user’s shell.
Why these techniques?

Path traversal in upload endpoints allows arbitrary file writes via the exposed local network API, directly enabling exploitation of the remote service (T1210) to place malicious payloads in Windows startup folders (T1547.001) or Linux Bash configuration directories (T1546.004) for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

LocalSend is a free, open-source app that allows users to securely share files and messages with nearby devices over their local network without needing an internet connection. Prior to version 1.17.0, due to the missing sanitization of the path in…

more

the `POST /api/localsend/v2/prepare-upload` and the `POST /api/localsend/v2/upload` endpoint, a malicious file transfer request can write files to the arbitrary location on the system, resulting in the remote command execution. A malicious file transfer request sent by nearby devices can write files into an arbitrary directory. This usually allows command execution via the startup folder on Windows or Bash-related files on Linux. If the user enables the `Quick Save` feature, it will silently write files without explicit user interaction. Version 1.17.0 fixes this issue.

Deeper analysisAI

CVE-2025-27142 is a path traversal vulnerability (CWE-22) in LocalSend, a free open-source cross-platform app for sharing files and messages over local networks without internet. Affecting versions prior to 1.17.0, the flaw stems from inadequate path sanitization in the POST /api/localsend/v2/prepare-upload and POST /api/localsend/v2/upload endpoints, enabling attackers to write files to arbitrary system locations. This can facilitate remote command execution, such as by placing malicious files in Windows startup folders or Linux Bash-related directories. The issue carries a CVSS v3.1 base score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Attackers on the adjacent network (AV:A) can exploit this without authentication (PR:N) by sending a crafted file transfer request from a nearby device. If the victim has Quick Save enabled, files are written silently without user interaction (UI:N), allowing arbitrary file placement that leads to command execution upon system events like reboots or logins. No elevated privileges are required, making it accessible to unauthenticated nearby adversaries.

The LocalSend security advisory (GHSA-f7jp-p6j4-3522) and fixing commit (e8635204ec782ded45bc7d698deb60f3c4105687) confirm that upgrading to version 1.17.0 resolves the vulnerability through proper path sanitization in the affected endpoints. Security practitioners should advise users to update immediately and disable Quick Save until patched.

Details

CWE(s)

Affected Products

localsend
localsend
≤ 1.17.0

CVEs Like This One

CVE-2026-39973Shared CWE-22
CVE-2025-40549Shared CWE-22
CVE-2026-22661Shared CWE-22
CVE-2026-25635Shared CWE-22
CVE-2025-40898Shared CWE-22
CVE-2026-40024Shared CWE-22
CVE-2026-32116Shared CWE-22
CVE-2026-20613Shared CWE-22
CVE-2026-26064Shared CWE-22
CVE-2025-11531Shared CWE-22

References