Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6h2f-wjhf-4wjx | Pyrofork has a Path Traversal in download_media Method |
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyrofork Project
Pyrofork Project pyrofork |
|
| Vendors & Products |
Pyrofork Project
Pyrofork Project pyrofork |
Thu, 11 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pyrofork is a modern, asynchronous MTProto API framework. Versions 2.3.68 and earlier do not properly sanitize filenames received from Telegram messages in the download_media method before using them in file path construction. When downloading media, if the user does not specify a custom filename (which is the common/default usage), the method falls back to using the file_name attribute from the media object. The attribute originates from Telegram's DocumentAttributeFilename and is controlled by the message sender. This issue is fixed in version 2.3.69. | |
| Title | Pyrofork has a Path Traversal in download_media Method | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-11T15:35:02.068Z
Reserved: 2025-12-10T18:46:14.762Z
Link: CVE-2025-67720
Updated: 2025-12-11T15:34:53.708Z
Status : Deferred
Published: 2025-12-11T02:16:19.090
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-67720
No data.
OpenCVE Enrichment
Updated: 2025-12-11T21:37:52Z
Github GHSA