CVE-2025-27092

7.5 HIGH

📋 TL;DR

A path traversal vulnerability in GHOSTS version 8.0.0.0 allows attackers to read arbitrary files from the server's filesystem by exploiting the photo retrieval endpoint. This affects all users running vulnerable versions of the GHOSTS user simulation framework, potentially exposing sensitive configuration files, credentials, and other system data.

💻 Affected Systems

Products:
  • GHOSTS
Versions: 8.0.0.0 to versions before 8.2.7.90
Operating Systems: All platforms running GHOSTS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable endpoint exposed are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive files like SSH keys, database credentials, or configuration files containing secrets, potentially leading to lateral movement or data exfiltration.

🟠

Likely Case

Exposure of sensitive application configuration files, user data, or system information that could be used for further attacks or reconnaissance.

🟢

If Mitigated

Limited impact if proper file permissions restrict web application process access to sensitive directories and files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires creating or modifying an NPC with a malicious photoLink value containing path traversal sequences.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.2.7.90

Vendor Advisory: https://github.com/cmu-sei/GHOSTS/security/advisories/GHSA-qr67-m6w9-wj3j

Restart Required: No

Instructions:

1. Backup your GHOSTS configuration and data. 2. Stop the GHOSTS service. 3. Upgrade to version 8.2.7.90 or later using your package manager or by downloading from GitHub. 4. Restart the GHOSTS service.

🔧 Temporary Workarounds

No known workarounds

all

The vendor advisory states there are no known workarounds for this vulnerability.

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to the GHOSTS API endpoints to trusted sources only.
  • Apply strict file system permissions to limit the web application process's access to sensitive directories and files.

🔍 How to Verify

Check if Vulnerable:

Check if your GHOSTS version is between 8.0.0.0 and versions before 8.2.7.90 by examining the application version or configuration files.

Check Version:

Check the GHOSTS application logs, configuration files, or use the application's admin interface to determine the version.

Verify Fix Applied:

Verify the installed version is 8.2.7.90 or later and test the /api/npcs/{id}/photo endpoint with path traversal attempts to confirm sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /api/npcs/*/photo endpoint containing ../ or ..\ sequences
  • Failed file access attempts outside expected photo directories

Network Indicators:

  • HTTP requests to photo endpoint with path traversal patterns in parameters

SIEM Query:

source="ghosts" AND (uri_path="/api/npcs/*/photo" AND (request_parameters CONTAINS "../" OR request_parameters CONTAINS "..\\"))

🔗 References

📤 Share & Export