Cyber Posture

CVE-2025-59384

High

Published: 02 January 2026

Published
02 January 2026
Modified
22 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0008 23.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-59384 is a high-severity Path Traversal (CWE-22) vulnerability in Qnap Qfiling. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-22

Validates pathnames and filenames to prevent traversal outside intended directories.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Path traversal in publicly exposed Qfiling service enables unauthenticated remote file read, mapping directly to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A path traversal vulnerability has been reported to affect Qfiling. The remote attackers can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: Qfiling 3.13.1…

more

and later

Deeper analysisAI

CVE-2025-59384 is a path traversal vulnerability (CWE-22) affecting Qfiling, a component developed by QNAP. Published on January 2, 2026, the flaw enables remote attackers to exploit improper handling of file paths, allowing them to access and read the contents of unexpected files or system data on vulnerable systems.

The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating it is exploitable over the network with low complexity, requiring no authentication, privileges, or user interaction. Unauthenticated remote attackers can thus achieve high-impact confidentiality breaches by disclosing sensitive files, while integrity and availability remain unaffected.

QNAP's security advisory (QSA-25-54) confirms the issue has been addressed in Qfiling version 3.13.1 and later. Security practitioners should prioritize updating affected Qfiling installations to mitigate the risk of unauthorized file disclosure.

Details

CWE(s)

Affected Products

qnap
qfiling
3.13.0

CVEs Like This One

CVE-2025-30276Same product class: NAS / storage appliance
CVE-2025-47206Same product class: NAS / storage appliance
CVE-2024-13086Same product class: NAS / storage appliance
CVE-2025-29894Same product class: NAS / storage appliance
CVE-2025-59385Same product class: NAS / storage appliance
CVE-2025-62849Same product class: NAS / storage appliance
CVE-2025-59389Same product class: NAS / storage appliance
CVE-2026-22898Same product class: NAS / storage appliance
CVE-2025-52425Same product class: NAS / storage appliance
CVE-2025-52856Same product class: NAS / storage appliance

References