CVE-2025-27142
📋 TL;DR
LocalSend versions before 1.17.0 have a path traversal vulnerability in file upload endpoints that allows attackers to write files to arbitrary locations on the system. This can lead to remote command execution by placing malicious files in startup folders or bash-related directories. All users running vulnerable versions with the Quick Save feature enabled are at risk.
💻 Affected Systems
- LocalSend
📦 What is this software?
Localsend by Localsend
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via remote code execution, allowing attacker to install malware, steal data, or create persistent backdoors.
Likely Case
File system corruption, data loss, or malware installation through malicious files written to sensitive locations.
If Mitigated
Limited to denial of service if file writes are blocked or contained.
🎯 Exploit Status
Requires attacker to be on same local network and user to accept file transfer (unless Quick Save enabled).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.17.0
Vendor Advisory: https://github.com/localsend/localsend/security/advisories/GHSA-f7jp-p6j4-3522
Restart Required: No
Instructions:
1. Download LocalSend version 1.17.0 or later from official sources. 2. Install the update. 3. Verify version is 1.17.0 or higher.
🔧 Temporary Workarounds
Disable Quick Save
allPrevents silent file writes without user interaction.
Open LocalSend settings and disable 'Quick Save' feature
Network Segmentation
allIsolate LocalSend devices from untrusted networks.
🧯 If You Can't Patch
- Disable LocalSend service completely
- Implement strict firewall rules to block LocalSend traffic from untrusted devices
🔍 How to Verify
Check if Vulnerable:
Check LocalSend version in application settings or about dialog.
Check Version:
On Linux: localsend --version (if CLI available) or check GUI about dialog
Verify Fix Applied:
Confirm version is 1.17.0 or higher in application settings.
📡 Detection & Monitoring
Log Indicators:
- Unusual file write operations to system directories
- Multiple failed upload attempts with suspicious paths
Network Indicators:
- POST requests to /api/localsend/v2/prepare-upload or /api/localsend/v2/upload with path traversal patterns
SIEM Query:
source="localsend.log" AND (path="..\\" OR path="../" OR path="%2e%2e%2f")