Description
ContentKeeper Web Appliance (now maintained by Impero Software) versions prior to 125.10 expose the mimencode binary via a CGI endpoint, allowing unauthenticated attackers to retrieve arbitrary files from the filesystem. By crafting a POST request to /cgi-bin/ck/mimencode with traversal and output parameters, attackers can read sensitive files such as /etc/passwd outside the webroot.
Published: 2025-08-20
Score: 8.7 High
EPSS: 49.6% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2009-5116 ContentKeeper Web Appliance (now maintained by Impero Software) versions prior to 125.10 expose the mimencode binary via a CGI endpoint, allowing unauthenticated attackers to retrieve arbitrary files from the filesystem. By crafting a POST request to /cgi-bin/ck/mimencode with traversal and output parameters, attackers can read sensitive files such as /etc/passwd outside the webroot.
History

Thu, 05 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sophos:web_appliance:*:*:*:*:*:*:*:*
Vendors & Products Sophos
Sophos web Appliance

Thu, 05 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Sophos
Sophos web Appliance
CPEs cpe:2.3:a:sophos:web_appliance:*:*:*:*:*:*:*:*
Vendors & Products Sophos
Sophos web Appliance

Sun, 24 Aug 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Contentkeeper Technologies
Contentkeeper Technologies contentkeeper
Vendors & Products Contentkeeper Technologies
Contentkeeper Technologies contentkeeper

Wed, 20 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 15:45:00 +0000

Type Values Removed Values Added
Description ContentKeeper Web Appliance (now maintained by Impero Software) versions prior to 125.10 expose the mimencode binary via a CGI endpoint, allowing unauthenticated attackers to retrieve arbitrary files from the filesystem. By crafting a POST request to /cgi-bin/ck/mimencode with traversal and output parameters, attackers can read sensitive files such as /etc/passwd outside the webroot.
Title ContentKeeper Web Appliance < 125.10 Arbitrary File Access via mimencode
Weaknesses CWE-552
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Contentkeeper Technologies Contentkeeper
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-15T11:13:10.937Z

Reserved: 2025-08-18T20:45:05.163Z

Link: CVE-2009-10005

cve-icon Vulnrichment

Updated: 2025-08-20T19:21:54.895Z

cve-icon NVD

Status : Deferred

Published: 2025-08-20T16:15:32.100

Modified: 2026-04-15T00:35:42.020

Link: CVE-2009-10005

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-24T22:19:09Z

Weaknesses