CVE-2025-22137

9.8 CRITICAL

📋 TL;DR

CVE-2025-22137 is a critical file overwrite vulnerability in Pingvin Share that allows attackers to overwrite arbitrary files on the server via HTTP POST requests. Both authenticated users and unauthenticated users (if anonymous shares are enabled) can exploit this vulnerability. This affects all Pingvin Share instances running vulnerable versions.

💻 Affected Systems

Products:
  • Pingvin Share
Versions: All versions before 1.4.0
Operating Systems: All platforms running Pingvin Share
Default Config Vulnerable: ⚠️ Yes
Notes: Unauthenticated exploitation requires anonymous shares to be enabled in configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through overwriting critical system files, installation of backdoors, or denial of service by corrupting essential files.

🟠

Likely Case

Data loss, service disruption, or unauthorized access to sensitive information stored on the server.

🟢

If Mitigated

Limited impact if proper file permissions and network segmentation are in place, though file integrity could still be compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP POST requests with crafted parameters. No special tools or advanced knowledge needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.0

Vendor Advisory: https://github.com/stonith404/pingvin-share/security/advisories/GHSA-rjwx-p44f-mcrv

Restart Required: Yes

Instructions:

1. Backup your current installation and data. 2. Stop the Pingvin Share service. 3. Update to version 1.4.0 using your deployment method (Docker, package manager, or manual update). 4. Restart the service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable Anonymous Shares

all

Prevents unauthenticated exploitation by requiring authentication for all file sharing operations.

Edit configuration to set ALLOW_ANONYMOUS_SHARES=false

Restrict File System Permissions

linux

Limit the application's ability to write to sensitive directories.

chmod -R 755 /var/www/pingvin-share
chown -R www-data:www-data /var/www/pingvin-share

🧯 If You Can't Patch

  • Disable anonymous shares in configuration immediately
  • Implement strict network access controls to limit who can access the Pingvin Share instance

🔍 How to Verify

Check if Vulnerable:

Check if Pingvin Share version is below 1.4.0 by examining the web interface footer or checking the package version.

Check Version:

docker exec pingvin-share cat /app/package.json | grep version

Verify Fix Applied:

Confirm version is 1.4.0 or higher and test that file overwrite attempts via POST requests are properly rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to file upload endpoints
  • Failed file write attempts outside expected directories
  • Multiple 403 or 500 errors from file operations

Network Indicators:

  • HTTP POST requests with crafted file paths in parameters
  • Unusual traffic patterns to file upload endpoints

SIEM Query:

source="pingvin-share" AND (method="POST" AND uri="/api/files" AND (status=403 OR status=500))

🔗 References

📤 Share & Export