CVE-2025-27920

7.2 HIGH CISA KEV

📋 TL;DR

CVE-2025-27920 is a directory traversal vulnerability in Output Messenger that allows attackers to access sensitive files outside intended directories using path traversal sequences like '../'. This affects all users running Output Messenger versions before 2.0.63, potentially exposing configuration files and other sensitive data.

💻 Affected Systems

Products:
  • Output Messenger
Versions: All versions before 2.0.63
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability exists in the file path handling mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through access to sensitive configuration files, credentials, or arbitrary file read/write leading to further exploitation.

🟠

Likely Case

Configuration file leakage exposing database credentials, application secrets, and system information that could enable follow-on attacks.

🟢

If Mitigated

Limited impact with proper network segmentation, file system permissions, and monitoring in place to detect traversal attempts.

🌐 Internet-Facing: HIGH - Directory traversal vulnerabilities are easily exploitable and Output Messenger is often deployed as an internet-facing communication platform.
🏢 Internal Only: MEDIUM - Still significant risk from internal threats or compromised internal systems, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial using '../' sequences. The vulnerability has been actively exploited in the wild according to Microsoft's report on 'Marbled Dust' campaigns.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.63

Vendor Advisory: https://www.outputmessenger.com/cve-2025-27920/

Restart Required: Yes

Instructions:

1. Download Output Messenger version 2.0.63 or later from the official website. 2. Backup your current installation and configuration. 3. Run the installer to upgrade. 4. Restart the Output Messenger service. 5. Verify the version is 2.0.63 or higher.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement input validation to filter '../' sequences and other path traversal patterns

# Example for web.config (IIS) or appropriate input filtering for your platform

File System Permissions Restriction

all

Restrict Output Messenger service account permissions to only necessary directories

# Windows: icacls "C:\Program Files\Output Messenger" /deny SERVICE_ACCOUNT:(OI)(CI)(DE,DC)
# Linux: chmod 750 /opt/outputmessenger && chown root:outputmessenger /opt/outputmessenger

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Output Messenger only from trusted networks
  • Deploy a web application firewall (WAF) with rules to detect and block path traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check the Output Messenger version in the admin panel or via the installed files. Versions below 2.0.63 are vulnerable.

Check Version:

# Windows: Check Help > About in Output Messenger Admin Panel
# Linux: Check /opt/outputmessenger/version.txt or similar version file

Verify Fix Applied:

Verify the version shows 2.0.63 or higher in the admin interface and test that '../' sequences in file parameters are properly rejected.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences
  • Access to unexpected file paths in application logs
  • Failed file access attempts outside normal directories

Network Indicators:

  • HTTP requests with encoded '../' sequences (%2e%2e%2f)
  • Unusual file access patterns to configuration or system files

SIEM Query:

source="output_messenger.log" AND ("..\/" OR "%2e%2e%2f" OR "..\\" OR path_traversal)

🔗 References

📤 Share & Export