
Cloud Vulnerability DB
A community-led vulnerabilities database
Dragonfly, an open source P2P-based file distribution and image acceleration system, was found to contain a critical vulnerability (CVE-2025-59352) affecting versions prior to 2.1.0. The vulnerability was discovered and disclosed on September 17, 2025, impacting the gRPC API and HTTP APIs that allow peers to interact with each other (GitHub Advisory).
The vulnerability exists in the peer-to-peer communication APIs where peers can send requests that force the recipient peer to create files in arbitrary file system locations and read arbitrary files. The issue stems from insufficient validation of file system operations in the API implementation. The vulnerability has received a CVSS v3.1 base score of 9.8 CRITICAL, with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability allows malicious peers to steal other peers' secret data and potentially gain remote code execution (RCE) capabilities on the peer's machine. This presents a severe security risk as it could lead to unauthorized access to sensitive information and complete system compromise (GitHub Advisory).
The vulnerability has been fixed in Dragonfly version 2.1.0. There are no effective workarounds available beyond upgrading to the patched version. Users are strongly advised to upgrade to version 2.1.0 or later to address this security issue (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."