logo

CVE-2025-53632 github.com/ctfer-io/chall-manager

Package

Manager: go
Name: github.com/ctfer-io/chall-manager
Vulnerable Version: >=0 <0.1.4

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00043 pctl0.12469

Details

Chall-Manager is vulnerable to Path Traversal when extracting/decoding a zip archive ### Impact When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is **highly** recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. ### Patches Patch has been implemented by [commit `47d188f`](https://github.com/ctfer-io/chall-manager/commit/47d188fda5e3f86285e820f12ad9fb6f9930662c) and shipped in [`v0.1.4`](https://github.com/ctfer-io/chall-manager/releases/tag/v0.1.4). ### Workarounds No workaround exist. ### References N/A.

Metadata

Created: 2025-07-10T17:48:54Z
Modified: 2025-08-14T22:21:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-3gv2-v3jx-r9fh/GHSA-3gv2-v3jx-r9fh.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-3gv2-v3jx-r9fh
Finding: F063
Auto approve: 1