{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T01:58:20.529","vulnerabilities":[{"cve":{"id":"CVE-2025-24891","sourceIdentifier":"security-advisories@github.com","published":"2025-01-31T23:15:08.457","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Dumb Drop is a file upload application. Users with permission to upload to the service are able to exploit a path traversal vulnerability to overwrite arbitrary system files. As the container runs as root by default, there is no limit to what can be overwritten. With this, it's possible to inject malicious payloads into files ran on schedule or upon certain service actions. As the service is not required to run with authentication enabled, this may permit wholly unprivileged users root access. Otherwise, anybody with a PIN."},{"lang":"es","value":"Dumb Drop es una aplicación de carga de archivos. Los usuarios con permiso para cargar archivos en el servicio pueden explotar una vulnerabilidad Path Traversal para sobrescribir archivos sistema arbitrarios. Como el contenedor se ejecuta como superusuario de forma predeterminada, no hay límite para lo que se puede sobrescribir. Con esto, es posible inyectar payloads maliciosos en archivos que se ejecutan según lo programado o en determinadas acciones del servicio. Como no se requiere que el servicio se ejecute con la autenticación habilitada, esto puede permitir el acceso superusuario a usuarios totalmente sin privilegios. De lo contrario, cualquier persona con un PIN."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"},{"lang":"en","value":"CWE-276"}]}],"references":[{"url":"https://github.com/DumbWareio/DumbDrop/commit/cb586316648ccbfb21d27b84e90d72ccead9819d","source":"security-advisories@github.com"},{"url":"https://github.com/DumbWareio/DumbDrop/security/advisories/GHSA-24f2-fv38-3274","source":"security-advisories@github.com"}]}}]}