Cyber Posture

CVE-2025-27410

MediumPublic PoC

Published: 28 February 2025

Published
28 February 2025
Modified
16 April 2025
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.1650 94.9th percentile
Risk Priority 23 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-27410 is a medium-severity Path Traversal (CWE-22) vulnerability in Pwndoc Project Pwndoc. Its CVSS base score is 6.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 5.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates validation of TAR entry names to prevent path traversal allowing arbitrary file overwrites during backup restore.

prevent

Enforces access control policies to restrict backup restore writes to authorized paths only, blocking overwrites of critical files like JavaScript components.

prevent

Applies least privilege to limit backups:create and backups:update permissions, reducing the attack surface for authenticated administrators exploiting the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Path traversal in web app backup restore allows remote file overwrite to plant malicious JS for RCE on restart, directly mapping to T1190 (exploit public-facing app) and T1059.007 (JavaScript execution).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting…

more

an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue.

Deeper analysisAI

CVE-2025-27410 is a path traversal vulnerability (CWE-22, CWE-23) in the backup restore functionality of PwnDoc, a penetration test reporting application. In versions prior to 1.2.0, the vulnerability stems from inadequate validation of TAR entry names, enabling attackers to overwrite arbitrary files on the system with attacker-controlled content.

The vulnerability can be exploited remotely over the network by authenticated users possessing both `backups:create` and `backups:update` permissions, which are restricted to administrators by default. Exploitation requires low complexity and no user interaction. An attacker can overwrite a JavaScript file included in the application, followed by restarting the container, to achieve remote code execution with administrator privileges. The CVSS v3.1 base score is 6.5 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N).

PwnDoc version 1.2.0 resolves the issue through a targeted fix in the backup handling code. The GitHub security advisory (GHSA-mxw8-vgvx-89hx), fix commit (98f284291d73d3a0b11d3181d845845c192d1080), and release page (v1.2.0) provide details on the patch and updated code in backend/src/routes/backup.js. Security practitioners should upgrade to version 1.2.0 or later and review access controls for backup permissions.

Details

CWE(s)

Affected Products

pwndoc project
pwndoc
≤ 1.2.0

CVEs Like This One

CVE-2025-23044Same product: Pwndoc Project Pwndoc
CVE-2026-21659Shared CWE-22, CWE-23
CVE-2025-29789Shared CWE-22, CWE-23
CVE-2026-27625Shared CWE-22, CWE-23
CVE-2026-27202Shared CWE-22, CWE-23
CVE-2026-7404Shared CWE-22, CWE-23
CVE-2025-59384Shared CWE-22
CVE-2025-15031Shared CWE-22
CVE-2026-7213Shared CWE-22
CVE-2026-24479Shared CWE-22

References