CVE-2025-59352

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the gRPC API and HTTP APIs allow peers to send requests that force the recipient peer to create files in arbitrary file system locations, and to read arbitrary files. This allows peers to steal other peers’ secret data and to gain remote code execution (RCE) capabilities on the peer’s machine.This vulnerability is fixed in 2.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*

History

No history.

Information

Published : 2025-09-17 20:15

Updated : 2025-09-18 20:09


NVD link : CVE-2025-59352

Mitre link : CVE-2025-59352

CVE.ORG link : CVE-2025-59352


JSON object : View

Products Affected

linuxfoundation

  • dragonfly
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-202

Exposure of Sensitive Information Through Data Queries