CVE-2025-6774

6.3 MEDIUM

📋 TL;DR

This critical path traversal vulnerability in gooaclok819 sublinkX allows attackers to access arbitrary files on the server by manipulating the filename parameter in the AddTemp function. Remote attackers can exploit this to read sensitive system files. All users running sublinkX versions up to 1.8 are affected.

💻 Affected Systems

Products:
  • gooaclok819 sublinkX
Versions: up to version 1.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using the vulnerable AddTemp function in api/template.go are affected

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading sensitive configuration files, credentials, or deploying malicious payloads to arbitrary locations

🟠

Likely Case

Unauthorized access to sensitive application files, configuration data, or user information stored on the server

🟢

If Mitigated

Limited to application-level file access if proper file permissions and sandboxing are implemented

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit has been publicly disclosed and requires minimal technical skill to execute

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9

Vendor Advisory: https://github.com/gooaclok819/sublinkX/releases/tag/1.9

Restart Required: Yes

Instructions:

1. Backup current configuration and data
2. Download version 1.9 from GitHub releases
3. Replace existing installation with patched version
4. Restart the sublinkX service

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to reject filename parameters containing path traversal sequences

# In api/template.go, add validation before AddTemp function
# Example: if strings.Contains(filename, "..") || strings.Contains(filename, "/") {
#     return error
# }

File Access Restriction

all

Configure file system permissions to restrict sublinkX to specific directories

# Linux: chroot or containerize sublinkX
# Windows: Use AppLocker or file system ACLs

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block path traversal patterns in requests
  • Isolate sublinkX instance in a restricted network segment with minimal file system access

🔍 How to Verify

Check if Vulnerable:

Check if running sublinkX version 1.8 or earlier by examining version files or running the application with --version flag

Check Version:

Check application configuration files or run: ./sublinkX --version

Verify Fix Applied:

Confirm version is 1.9 or later and test that path traversal attempts in filename parameter are properly rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Requests with ../ sequences in filename parameter
  • Access to files outside expected template directories

Network Indicators:

  • HTTP requests containing path traversal sequences (%2e%2e%2f, ..\, etc.) in parameters

SIEM Query:

source="sublinkX" AND (filename="*..*" OR uri="*%2e%2e%2f*")

🔗 References

📤 Share & Export