Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 10 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Area9lyceum
Area9lyceum rhapsode |
|
| CPEs | cpe:2.3:a:area9lyceum:rhapsode:1.47.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Area9lyceum
Area9lyceum rhapsode |
Fri, 09 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 | |
| Metrics |
cvssV3_1
|
Fri, 09 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Area9 Rhapsode 1.47.3, an authenticated attacker can exploit the operation, url, and filename parameters via POST request to read arbitrary files from the server filesystem. Fixed in 1.47.4 (#7254) and further versions. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-09T21:26:03.111Z
Reserved: 2025-12-12T00:00:00.000Z
Link: CVE-2025-67810
Updated: 2026-01-09T21:25:58.454Z
Status : Analyzed
Published: 2026-01-09T20:15:51.887
Modified: 2026-02-10T19:45:24.400
Link: CVE-2025-67810
No data.
OpenCVE Enrichment
No data.