We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53908

RomM vulnerable to Authenticated Path Traversal



Description

RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch.

Reserved 2025-07-11 | Published 2025-07-16 | Updated 2025-07-16 | Assigner GitHub_M


HIGH: 8.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Problem types

CWE-26: Path Traversal: '/dir/../filename'

Product status

< 3.10.3
affected

< 4.0.0-beta.3
affected

References

github.com/...p/romm/security/advisories/GHSA-fx9g-xw4j-jwc3

github.com/...ommit/7c94cb05e74ddb6a6af7b82320686c01754e9966

github.com/...ommit/baa1a9759079c36e36a9f10c920c46b57d0b6151

github.com/...omm/blob/4.0.0-beta.2/backend/endpoints/raw.py

cve.org (CVE-2025-53908)

nvd.nist.gov (CVE-2025-53908)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53908

Support options

Helpdesk Chat, Email, Knowledgebase