CVE-2025-27920

high-risk
Published 2025-05-05

Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.

Do I need to act?

!
52.0% chance of exploitation in next 30 days
EPSS score — higher than 48% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.2/10 High
NETWORK / LOW complexity

Affected Products (1)

Affected Vendors

56
/ 100
high-risk
Severity 26/34 · High
Exploitability 25/34 · High
Exposure 5/34 · Minimal