CVE-2025-60946
Published: 23 March 2026
Summary
CVE-2025-60946 is a high-severity Path Traversal (CWE-22) vulnerability in Csprousers Csweb. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the improper handling of arbitrary file path inputs by requiring validation to block path traversal sequences like '../'.
Enforces approved access authorizations to prevent authenticated users from accessing unintended file directories outside their privileges.
Requires timely identification, reporting, and correction of flaws like this path traversal vulnerability through patching to version 8.1.0.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing web app enables initial access via exploitation (T1190) and facilitates arbitrary file reads for data collection (T1005) and file/directory discovery (T1083).
NVD Description
Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated attacker could access unintended file directories. Fixed in 8.1.0 alpha.
Deeper analysisAI
CVE-2025-60946 is a path traversal vulnerability (CWE-22) in Census CSWeb version 8.0.1, stemming from improper handling of arbitrary file path input. This flaw allows a remote, authenticated attacker to access unintended file directories on the server. The vulnerability was published on 2026-03-23 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.
A remote attacker with low-privilege authenticated access (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity and no user interaction required. Successful exploitation enables traversal of directory boundaries, potentially allowing read, modification, or deletion of sensitive files outside the intended scope, leading to unauthorized data exposure, tampering, or disruption of services.
Mitigation is available in Census CSWeb 8.1.0 alpha, as detailed in the fixing commit at https://github.com/csprousers/csweb/commit/eba0b59a243390a1a4f9524cce6dbc0314bf0d91. Additional resources include a CSAF advisory at https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2026/va-26-079-01.json, proof-of-concept exploits at https://github.com/hx381/cspro-exploits, and the official CVE record at https://www.cve.org/CVERecord?id=CVE-2025-60946. Security practitioners should upgrade to the patched version and review access controls for authenticated users.
Details
- CWE(s)