CVE-2025-24786
Linux openSUSE vulnerability analysis and mitigation

Overview

CVE-2025-24786 is a critical path traversal vulnerability discovered in WhoDB, an open-source database management tool. The vulnerability was disclosed on February 6, 2025, affecting all versions prior to 0.45.0. While WhoDB is designed to only display SQLite3 databases within the /db directory, the lack of path traversal prevention allows an unauthenticated attacker to access any SQLite3 database present on the host machine (GitHub Advisory, NVD).

Technical details

The vulnerability stems from improper limitation of pathname to a restricted directory. WhoDB uses .Join() with the default directory to get the full path of the database file but performs no validation to ensure the accessed file actually resides within the intended /db directory (or ./tmp in development mode). This oversight allows attackers to use path traversal sequences (../../) to navigate outside the intended directory. The vulnerability has received a CVSS v3.1 score of 10.0 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N, indicating its severe nature (Security Online, GitHub Advisory).

Impact

The exploitation of this vulnerability allows unauthenticated attackers to gain unauthorized access to any SQLite3 database file present on the system. If WhoDB has write permissions for the database file, attackers can not only read but also modify the accessed databases. This could lead to exposure of confidential information such as user credentials, financial records, or other proprietary data (SecMaster).

Mitigation and workarounds

The vulnerability has been patched in WhoDB version 0.45.0. Users are strongly advised to upgrade to this version or later. For cases where immediate upgrade is not possible, there are no effective workarounds other than temporarily disabling WhoDB. Organizations should also implement additional security measures such as network segmentation, access controls, and regular security audits (SecMaster).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management