CVE-2025-53632 – github.com/ctfer-io/chall-manager
Package
Manager: go
Name: github.com/ctfer-io/chall-manager
Vulnerable Version: >=0 <0.1.4
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00043 pctl0.12469
Details
Chall-Manager is vulnerable to Path Traversal when extracting/decoding a zip archive ### Impact When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is **highly** recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. ### Patches Patch has been implemented by [commit `47d188f`](https://github.com/ctfer-io/chall-manager/commit/47d188fda5e3f86285e820f12ad9fb6f9930662c) and shipped in [`v0.1.4`](https://github.com/ctfer-io/chall-manager/releases/tag/v0.1.4). ### Workarounds No workaround exist. ### References N/A.
Metadata
Created: 2025-07-10T17:48:54Z
Modified: 2025-08-14T22:21:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-3gv2-v3jx-r9fh/GHSA-3gv2-v3jx-r9fh.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-3gv2-v3jx-r9fh
Finding: F063
Auto approve: 1