CVE-2025-12250
📋 TL;DR
CVE-2025-12250 is a path traversal vulnerability in OpenWGA 7.11.12 Build 737 that allows attackers to access files outside the intended directory via the TMLScript API. This affects OpenWGA installations with the vulnerable component exposed. Remote attackers can potentially read sensitive files on affected systems.
💻 Affected Systems
- OpenWGA
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive system files, configuration files, or application data, potentially leading to credential theft, data exposure, or further system compromise.
Likely Case
Unauthorized file reading of web-accessible directories, potentially exposing configuration files, source code, or other sensitive application data.
If Mitigated
Limited impact with proper file system permissions and web server configuration restricting access to sensitive directories.
🎯 Exploit Status
Exploit details are published in GitHub repository, but specific exploitation conditions are not fully documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available - vendor did not respond to disclosure
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available or implementing workarounds.
🔧 Temporary Workarounds
Disable TMLScript API
allDisable or restrict access to the vulnerable TMLScript API component if not required for functionality.
Implement Web Application Firewall Rules
allConfigure WAF rules to block path traversal patterns and restrict access to the WGA.File API endpoint.
🧯 If You Can't Patch
- Implement strict file system permissions to limit what directories the web application can access
- Deploy network segmentation to isolate OpenWGA instances from sensitive systems
🔍 How to Verify
Check if Vulnerable:
Check OpenWGA version and build number. If running 7.11.12 Build 737 with TMLScript API enabled, system is vulnerable.
Check Version:
Check OpenWGA administration interface or configuration files for version information.
Verify Fix Applied:
Verify TMLScript API is disabled or restricted, or that system has been upgraded to a non-vulnerable version.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns via TMLScript API
- Multiple failed attempts to access WGA.File endpoint with traversal patterns
Network Indicators:
- HTTP requests containing path traversal sequences (../, ..\) to WGA.File endpoints
SIEM Query:
web.url:*WGA.File* AND (web.url:*../* OR web.url:*..\*)