We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch.
Reserved 2025-07-11 | Published 2025-07-16 | Updated 2025-07-16 | Assigner GitHub_MCWE-26: Path Traversal: '/dir/../filename'
github.com/...p/romm/security/advisories/GHSA-fx9g-xw4j-jwc3
github.com/...ommit/7c94cb05e74ddb6a6af7b82320686c01754e9966
github.com/...ommit/baa1a9759079c36e36a9f10c920c46b57d0b6151
github.com/...omm/blob/4.0.0-beta.2/backend/endpoints/raw.py
Support options