CVE-2025-65792
Published: 10 December 2025
Summary
CVE-2025-65792 is a critical-severity Path Traversal (CWE-22) vulnerability in Datagear Datagear. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of user inputs to block path traversal sequences that enable arbitrary file deletion in DataGear v5.5.0.
Establishes processes to identify, prioritize, and remediate flaws like this critical path traversal vulnerability promptly.
Enforces restrictions on inputs at application boundaries to limit file paths to authorized locations, preventing arbitrary deletions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote exploitation of a public-facing web application (T1190) enables arbitrary file deletion on the target system (T1070.004), directly impacting integrity and availability.
NVD Description
DataGear v5.5.0 is vulnerable to Arbitrary File Deletion.
Deeper analysisAI
CVE-2025-65792 is an arbitrary file deletion vulnerability affecting DataGear version 5.5.0. Classified under CWE-22 (path traversal), it carries a CVSS v3.1 base score of 9.1 (Critical), with a vector of AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H, indicating no confidentiality impact but high integrity and availability impacts.
Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows arbitrary file deletion on the target system, potentially disrupting service availability and compromising data integrity by removing critical files.
For mitigation details, refer to the vendor advisories and references, including the GitHub issue at https://github.com/X3J1n/datagear/issues/1 and the Gist PoC at https://gist.github.com/X3J1n/82b047efdbfd74c414a6d63339ad12fb.
Details
- CWE(s)