{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T01:29:04.025","vulnerabilities":[{"cve":{"id":"CVE-2025-27410","sourceIdentifier":"security-advisories@github.com","published":"2025-02-28T21:15:27.677","lastModified":"2025-04-16T13:04:55.890","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue."},{"lang":"es","value":"PwnDoc es una aplicación de informes de pruebas de penetración. Antes de la versión 1.2.0, la función de restauración de copias de seguridad era vulnerable a la navegación por rutas en el nombre de la entrada TAR, lo que permitía a un atacante sobrescribir cualquier archivo del sistema con su contenido. Al sobrescribir un archivo `.js` incluido y reiniciar el contenedor, se permite la ejecución remota de código como administrador. La ejecución remota de código se produce porque cualquier usuario con `backups:create` y `backups:update` (solo administradores de forma predeterminada) puede sobrescribir cualquier archivo del sistema. La versión 1.2.0 soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"},{"lang":"en","value":"CWE-23"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pwndoc_project:pwndoc:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0","matchCriteriaId":"11E7BA7B-6D6B-4186-80A8-06B69AA22B20"}]}]}],"references":[{"url":"https://github.com/pwndoc/pwndoc/blob/14acb704891245bf1703ce6296d62112e85aa995/backend/src/routes/backup.js#L527","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/pwndoc/pwndoc/commit/98f284291d73d3a0b11d3181d845845c192d1080","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/pwndoc/pwndoc/releases/tag/v1.2.0","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}