CVE-2025-54769
Published: 29 July 2025
Summary
CVE-2025-54769 is a high-severity Path Traversal: '../filedir' (CWE-24) vulnerability in Xorux Lpar2Rrd. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 9.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates uploaded file names and paths to directly prevent directory traversal and unrestricted file placement exploits.
Enforces least privilege to deny read-only authenticated users the ability to perform file upload and write operations.
Restricts unauthorized information inputs such as file uploads for read-only users, blocking the initial exploitation vector.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct RCE via authenticated file upload + directory traversal in public-facing web app (LPAR2RRD).
NVD Description
An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote…
more
code execution (RCE) by an attacker.
Deeper analysisAI
CVE-2025-54769 is a high-severity vulnerability (CVSS 8.8, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) affecting LPAR2RRD software, associated with CWE-24 (path equivalence), CWE-434 (unrestricted file upload), and CWE-648. Published on 2025-07-29, it enables an authenticated read-only user to upload a file and exploit directory traversal to place it in an arbitrary location. This allows overwriting existing Perl modules within the application, facilitating remote code execution (RCE).
The attack requires an authenticated read-only user account, exploitable over the network with low complexity and no user interaction. An attacker can achieve RCE by crafting a malicious file upload that traverses directories to target and replace Perl modules, granting high-impact confidentiality, integrity, and availability compromise on the affected system.
Mitigation details are outlined in vendor and researcher advisories, including KoreLogic's KL-001-2025-016, LPAR2RRD's note800.php, and the Full Disclosure mailing list post at seclists.org/fulldisclosure/2025/Jul/19. Security practitioners should consult these references for patching instructions and workarounds.
Details
- CWE(s)