We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54071

RomM's authenticated arbitrary file write vulnerability can lead to Remote Code Execution



Description

RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. In versions 4.0.0-beta.3 and below, an authenticated arbitrary file write vulnerability exists in the /api/saves endpoint. This can lead to Remote Code Execution on the system. The vulnerability permits arbitrary file write operations, allowing attackers to create or modify files at any filesystem location with user-supplied content. A user with viewer role or Scope.ASSETS_WRITE permission or above is required to pass authentication checks. The vulnerability is fixed in version 4.0.0-beta.4.

Reserved 2025-07-16 | Published 2025-07-21 | Updated 2025-07-21 | Assigner GitHub_M


CRITICAL: 9.4CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-434: Unrestricted Upload of File with Dangerous Type

Product status

< 4.0.0-beta.4
affected

References

github.com/...p/romm/security/advisories/GHSA-fgxf-hggc-qqmq

github.com/...ommit/89248d03805e5fabca78443dd202ff32e0b4d9f3

cve.org (CVE-2025-54071)

nvd.nist.gov (CVE-2025-54071)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54071

Support options

Helpdesk Chat, Email, Knowledgebase