Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18986 | SysmonElixir is a system monitor HTTP service in Elixir. Prior to version 1.0.1, the /read endpoint reads any file from the server's /etc/passwd by default. In v1.0.1, a whitelist was added that limits reading to only files under priv/data. This issue has been patched in version 1.0.1. |
Tue, 24 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Jun 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SysmonElixir is a system monitor HTTP service in Elixir. Prior to version 1.0.1, the /read endpoint reads any file from the server's /etc/passwd by default. In v1.0.1, a whitelist was added that limits reading to only files under priv/data. This issue has been patched in version 1.0.1. | |
| Title | SysmonElixir path traversal in /read endpoint allows arbitrary file read | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-24T15:11:46.873Z
Reserved: 2025-06-18T03:55:52.036Z
Link: CVE-2025-52574
Updated: 2025-06-24T15:11:38.674Z
Status : Deferred
Published: 2025-06-24T03:15:34.797
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-52574
No data.
OpenCVE Enrichment
No data.
EUVD