CVE-2025-12250

4.7 MEDIUM

📋 TL;DR

CVE-2025-12250 is a path traversal vulnerability in OpenWGA 7.11.12 Build 737 that allows attackers to access files outside the intended directory via the TMLScript API. This affects OpenWGA installations with the vulnerable component exposed. Remote attackers can potentially read sensitive files on affected systems.

💻 Affected Systems

Products:
  • OpenWGA
Versions: 7.11.12 Build 737
Operating Systems: All platforms running OpenWGA
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the TMLScript API component enabled and accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or application data, potentially leading to credential theft, data exposure, or further system compromise.

🟠

Likely Case

Unauthorized file reading of web-accessible directories, potentially exposing configuration files, source code, or other sensitive application data.

🟢

If Mitigated

Limited impact with proper file system permissions and web server configuration restricting access to sensitive directories.

🌐 Internet-Facing: MEDIUM - Remote exploitation is possible, but requires specific conditions and the CVSS score suggests moderate impact.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this to access sensitive files, but network segmentation and access controls would limit impact.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details are published in GitHub repository, but specific exploitation conditions are not fully documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Disable TMLScript API

all

Disable or restrict access to the vulnerable TMLScript API component if not required for functionality.

Implement Web Application Firewall Rules

all

Configure WAF rules to block path traversal patterns and restrict access to the WGA.File API endpoint.

🧯 If You Can't Patch

  • Implement strict file system permissions to limit what directories the web application can access
  • Deploy network segmentation to isolate OpenWGA instances from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check OpenWGA version and build number. If running 7.11.12 Build 737 with TMLScript API enabled, system is vulnerable.

Check Version:

Check OpenWGA administration interface or configuration files for version information.

Verify Fix Applied:

Verify TMLScript API is disabled or restricted, or that system has been upgraded to a non-vulnerable version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns via TMLScript API
  • Multiple failed attempts to access WGA.File endpoint with traversal patterns

Network Indicators:

  • HTTP requests containing path traversal sequences (../, ..\) to WGA.File endpoints

SIEM Query:

web.url:*WGA.File* AND (web.url:*../* OR web.url:*..\*)

🔗 References

📤 Share & Export