CVE-2025-7060
📋 TL;DR
Monitorr versions up to 1.7.6m contain an improper input validation vulnerability in the installer component. Attackers can remotely manipulate the 'datadir' parameter in assets/config/_installation/mkdbajax.php, potentially causing unexpected behavior. This affects all Monitorr installations using vulnerable versions.
💻 Affected Systems
- Monitorr
📦 What is this software?
Monitorr by Monitorr
⚠️ Risk & Real-World Impact
Worst Case
Remote attackers could potentially manipulate directory paths to cause denial of service, file corruption, or unauthorized file access depending on server configuration.
Likely Case
Limited impact such as failed installations, configuration errors, or minor service disruption due to improper path handling.
If Mitigated
Minimal impact with proper input validation and restricted file system permissions in place.
🎯 Exploit Status
Exploit has been publicly disclosed but requires specific conditions and manipulation of the datadir parameter during installation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Consider upgrading to any future version beyond 1.7.6m if released by vendor.
🔧 Temporary Workarounds
Restrict Installer Access
linuxRemove or restrict access to the installer directory after initial setup
rm -rf /path/to/monitorr/assets/config/_installation/
chmod 000 /path/to/monitorr/assets/config/_installation/
Implement Web Application Firewall
allAdd WAF rules to block requests to the vulnerable endpoint
🧯 If You Can't Patch
- Remove or disable the installer component after initial setup
- Implement strict network access controls to limit who can access the Monitorr installation interface
🔍 How to Verify
Check if Vulnerable:
Check if Monitorr version is 1.7.6m or earlier and if assets/config/_installation/mkdbajax.php exists
Check Version:
Check Monitorr version in web interface or configuration files
Verify Fix Applied:
Verify the installer directory is removed or inaccessible, or upgrade to a version beyond 1.7.6m
📡 Detection & Monitoring
Log Indicators:
- Unusual requests to assets/config/_installation/mkdbajax.php
- Multiple failed installation attempts
- Unexpected datadir parameter values
Network Indicators:
- HTTP requests to installer endpoints from unexpected sources
SIEM Query:
web_access_logs WHERE uri CONTAINS 'mkdbajax.php' AND method = 'POST'