Cyber Posture

CVE-2025-60946

High

Published: 23 March 2026

Published
23 March 2026
Modified
26 March 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0026 49.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-60946 is a high-severity Path Traversal (CWE-22) vulnerability in Csprousers Csweb. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the improper handling of arbitrary file path inputs by requiring validation to block path traversal sequences like '../'.

prevent

Enforces approved access authorizations to prevent authenticated users from accessing unintended file directories outside their privileges.

prevent

Requires timely identification, reporting, and correction of flaws like this path traversal vulnerability through patching to version 8.1.0.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
Why these techniques?

Path traversal in public-facing web app enables initial access via exploitation (T1190) and facilitates arbitrary file reads for data collection (T1005) and file/directory discovery (T1083).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated attacker could access unintended file directories. Fixed in 8.1.0 alpha.

Deeper analysisAI

CVE-2025-60946 is a path traversal vulnerability (CWE-22) in Census CSWeb version 8.0.1, stemming from improper handling of arbitrary file path input. This flaw allows a remote, authenticated attacker to access unintended file directories on the server. The vulnerability was published on 2026-03-23 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.

A remote attacker with low-privilege authenticated access (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity and no user interaction required. Successful exploitation enables traversal of directory boundaries, potentially allowing read, modification, or deletion of sensitive files outside the intended scope, leading to unauthorized data exposure, tampering, or disruption of services.

Mitigation is available in Census CSWeb 8.1.0 alpha, as detailed in the fixing commit at https://github.com/csprousers/csweb/commit/eba0b59a243390a1a4f9524cce6dbc0314bf0d91. Additional resources include a CSAF advisory at https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2026/va-26-079-01.json, proof-of-concept exploits at https://github.com/hx381/cspro-exploits, and the official CVE record at https://www.cve.org/CVERecord?id=CVE-2025-60946. Security practitioners should upgrade to the patched version and review access controls for authenticated users.

Details

CWE(s)

Affected Products

csprousers
csweb
8.0.1

CVEs Like This One

CVE-2025-60949Same product: Csprousers Csweb
CVE-2025-60947Same product: Csprousers Csweb
CVE-2024-57451Shared CWE-22
CVE-2025-52452Shared CWE-22
CVE-2021-47850Shared CWE-22
CVE-2019-25579Shared CWE-22
CVE-2024-57549Shared CWE-22
CVE-2022-50890Shared CWE-22
CVE-2026-22557Shared CWE-22
CVE-2026-6024Shared CWE-22

References