CVE-2025-53908 (GCVE-0-2025-53908)

Vulnerability from cvelistv5 – Published: 2025-07-16 19:55 – Updated: 2025-07-18 14:21
VLAI?
Summary
RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch.
CWE
  • CWE-26 - Path Traversal: '/dir/../filename'
Assigner
Impacted products
Vendor Product Version
rommapp romm Affected: < 3.10.3
Affected: < 4.0.0-beta.3
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-53908",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-18T14:21:41.812165Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-18T14:21:44.885Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/rommapp/romm/security/advisories/GHSA-fx9g-xw4j-jwc3"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "romm",
          "vendor": "rommapp",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 3.10.3"
            },
            {
              "status": "affected",
              "version": "\u003c 4.0.0-beta.3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-26",
              "description": "CWE-26: Path Traversal: \u0027/dir/../filename\u0027",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-16T19:55:31.608Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/rommapp/romm/security/advisories/GHSA-fx9g-xw4j-jwc3",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/rommapp/romm/security/advisories/GHSA-fx9g-xw4j-jwc3"
        },
        {
          "name": "https://github.com/rommapp/romm/commit/7c94cb05e74ddb6a6af7b82320686c01754e9966",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/rommapp/romm/commit/7c94cb05e74ddb6a6af7b82320686c01754e9966"
        },
        {
          "name": "https://github.com/rommapp/romm/commit/baa1a9759079c36e36a9f10c920c46b57d0b6151",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/rommapp/romm/commit/baa1a9759079c36e36a9f10c920c46b57d0b6151"
        },
        {
          "name": "https://github.com/rommapp/romm/blob/4.0.0-beta.2/backend/endpoints/raw.py#L31",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/rommapp/romm/blob/4.0.0-beta.2/backend/endpoints/raw.py#L31"
        }
      ],
      "source": {
        "advisory": "GHSA-fx9g-xw4j-jwc3",
        "discovery": "UNKNOWN"
      },
      "title": "RomM vulnerable to Authenticated Path Traversal"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-53908",
    "datePublished": "2025-07-16T19:55:15.844Z",
    "dateReserved": "2025-07-11T19:05:23.827Z",
    "dateUpdated": "2025-07-18T14:21:44.885Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-53908\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-07-16T20:15:24.857\",\"lastModified\":\"2025-07-18T15:15:28.413\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch.\"},{\"lang\":\"es\",\"value\":\"RomM es un gestor y reproductor de ROM autoalojado. Las versiones anteriores a la 3.10.3 y 4.0.0-beta.3 presentan una vulnerabilidad de path traversal autenticadas en el endpoint `/api/raw`. Cualquiera que ejecute la \u00faltima versi\u00f3n de RomM y tenga varios usuarios, incluso sin privilegios, como el usuario de kiosco en la implementaci\u00f3n oficial, podr\u00eda verse afectado. Esto permite la filtraci\u00f3n de contrase\u00f1as y usuarios almacenados en el sistema. Las versiones 3.10.3 y 4.0.0-beta.3 incluyen un parche.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"HIGH\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-26\"}]}],\"references\":[{\"url\":\"https://github.com/rommapp/romm/blob/4.0.0-beta.2/backend/endpoints/raw.py#L31\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/rommapp/romm/commit/7c94cb05e74ddb6a6af7b82320686c01754e9966\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/rommapp/romm/commit/baa1a9759079c36e36a9f10c920c46b57d0b6151\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/rommapp/romm/security/advisories/GHSA-fx9g-xw4j-jwc3\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/rommapp/romm/security/advisories/GHSA-fx9g-xw4j-jwc3\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-53908\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-18T14:21:41.812165Z\"}}}], \"references\": [{\"url\": \"https://github.com/rommapp/romm/security/advisories/GHSA-fx9g-xw4j-jwc3\", \"tags\": [\"exploit\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-18T14:21:29.890Z\"}}], \"cna\": {\"title\": \"RomM vulnerable to Authenticated Path Traversal\", \"source\": {\"advisory\": \"GHSA-fx9g-xw4j-jwc3\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 8.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"HIGH\", \"vulnConfidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"rommapp\", \"product\": \"romm\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 3.10.3\"}, {\"status\": \"affected\", \"version\": \"\u003c 4.0.0-beta.3\"}]}], \"references\": [{\"url\": \"https://github.com/rommapp/romm/security/advisories/GHSA-fx9g-xw4j-jwc3\", \"name\": \"https://github.com/rommapp/romm/security/advisories/GHSA-fx9g-xw4j-jwc3\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/rommapp/romm/commit/7c94cb05e74ddb6a6af7b82320686c01754e9966\", \"name\": \"https://github.com/rommapp/romm/commit/7c94cb05e74ddb6a6af7b82320686c01754e9966\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/rommapp/romm/commit/baa1a9759079c36e36a9f10c920c46b57d0b6151\", \"name\": \"https://github.com/rommapp/romm/commit/baa1a9759079c36e36a9f10c920c46b57d0b6151\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/rommapp/romm/blob/4.0.0-beta.2/backend/endpoints/raw.py#L31\", \"name\": \"https://github.com/rommapp/romm/blob/4.0.0-beta.2/backend/endpoints/raw.py#L31\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-26\", \"description\": \"CWE-26: Path Traversal: \u0027/dir/../filename\u0027\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-07-16T19:55:31.608Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-53908\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-18T14:21:44.885Z\", \"dateReserved\": \"2025-07-11T19:05:23.827Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-07-16T19:55:15.844Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…