
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A directory traversal vulnerability was discovered in OpenC3 COSMOS version 6.0.0, specifically affecting the openc3-api/tables endpoint. The vulnerability was assigned CVE-2025-28382 and was publicly disclosed on June 13, 2025. This security flaw affects the core functionality of OpenC3 COSMOS, a command and control software suite designed for space mission operations (OpenC3 Website, VisionSpace Assessment).
The vulnerability exists in the openc3-api/tables endpoint which is responsible for managing and editing binary files according to their definitions. The flaw allows authenticated attackers to traverse directory paths, enabling unauthorized access to files outside the intended directory structure. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating a high-severity issue with network accessibility and no user interaction required (NVD Database).
The vulnerability allows authenticated attackers to read, delete, and copy arbitrary files within the container. Since the Docker container runs with root privileges by default, there are no restrictions on which files can be accessed. This could lead to unauthorized access to sensitive system files, potential information disclosure, and system compromise (VisionSpace Assessment).
Security researchers recommend implementing proper input sanitization for all user input, including parameters obtained directly from URLs. Additionally, user file read/write operations should be restricted to only the required folders within the host. It is also advised to configure the Docker container to run with restricted privileges rather than root by default (VisionSpace Assessment).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”