CVE-2025-27920
high-risk
Published 2025-05-05
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
Do I need to act?
!
52.0% chance of exploitation in next 30 days
EPSS score — higher than 48% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.2/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Vendor Advisory
https://www.outputmessenger.com/cve-2025-27920/
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-...
56
/ 100
high-risk
Severity
26/34 · High
Exploitability
25/34 · High
Exposure
5/34 · Minimal