Vulnerability Description
ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| C4Illin | Convertx | < 0.16.0 |
Related Weaknesses (CWE)
References
- https://github.com/C4illin/ConvertX/blob/4ae2aab66ace7cdcc14c5a16ecaaf2372b9ccbdProduct
- https://github.com/C4illin/ConvertX/commit/550f472451755d095cf5802bc91f403e85b71Patch
- https://github.com/C4illin/ConvertX/security/advisories/GHSA-cpww-gwgc-p72rExploitVendor Advisory
- https://github.com/C4illin/ConvertX/security/advisories/GHSA-cpww-gwgc-p72rExploitVendor Advisory
FAQ
What is CVE-2025-66449?
CVE-2025-66449 is a vulnerability with a CVSS score of 8.8 (HIGH). ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowi...
How severe is CVE-2025-66449?
CVE-2025-66449 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-66449?
Check the references section above for vendor advisories and patch information. Affected products include: C4Illin Convertx.