We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49830

Conjur OSS and Secrets Manager, Self-Hosted (formerly Conjur Enterprise) vulnerable to path traversal and file disclosure



Description

Conjur provides secrets management and application identity for infrastructure. An authenticated attacker who is able to load policy can use the policy yaml parser to reference files on the Secrets Manager, Self-Hosted server. These references may be used as reconnaissance to better understand the folder structure of the Secrets Manager/Conjur server or to have the yaml parser include files on the server in the yaml that is processed as the policy loads. This issue affects Secrets Manager, Self-Hosted (formerly Conjur Enterprise) prior to versions 13.5.1 and 13.6.1 and Conjur OSS prior to version 1.22.1. Conjur OSS version 1.22.1 and Secrets Manager, Self-Hosted versions 13.5.1 and 13.6.1 fix the issue.

Reserved 2025-06-11 | Published 2025-07-15 | Updated 2025-07-15 | Assigner GitHub_M


HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Conjur OSS < 1.22.1
affected

Secrets Manager, Self-Hosted (formerly known as Conjur Enterprise) < 13.5.1
affected

Secrets Manager, Self-Hosted (formerly known as Conjur Enterprise) = 13.6
affected

References

github.com/...conjur/security/advisories/GHSA-7m6h-fqrm-m9c5

github.com/cyberark/conjur/releases/tag/v1.22.1

cve.org (CVE-2025-49830)

nvd.nist.gov (CVE-2025-49830)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49830

Support options

Helpdesk Chat, Email, Knowledgebase