
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-59347 affects Dragonfly, an open source P2P-based file distribution and image acceleration system, prior to version 2.1.0. The vulnerability was discovered and disclosed in September 2025, impacting the Manager component of the system (Security Advisory).
The vulnerability stems from the Manager component disabling TLS certificate verification in HTTP clients. The critical issue lies in the implementation where the TLS verification is explicitly disabled through the InsecureSkipVerify configuration setting, and users have no way to re-enable this security feature. The CVSS v4.0 assessment indicates this is a network-level vulnerability that can be exploited without special privileges (CVSS Calculator).
When exploited, this vulnerability can lead to denial of service and file integrity problems. The primary risk occurs when the Manager processes preheat jobs, where an attacker performing a network-level Man-in-the-Middle attack can provide invalid data to the Manager. This compromised data is then used in the preheating process, potentially affecting system availability and data integrity (Security Advisory).
The vulnerability has been fixed in Dragonfly version 2.1.0. There are no effective workarounds available besides upgrading to the patched version. Users are strongly advised to upgrade to version 2.1.0 or later to address this security issue (Security Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."