ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.
History

Tue, 16 Dec 2025 00:45:00 +0000

Type Values Removed Values Added
Description ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.
Title ConvertX has Path Traversal that leads to Arbitrary File Write and Arbitrary Code Execution
Weaknesses CWE-22
CWE-434
CWE-73
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-12-16T00:10:49.204Z

Updated: 2025-12-16T00:10:49.204Z

Reserved: 2025-12-01T18:22:06.865Z

Link: CVE-2025-66449

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-16T01:15:51.750

Modified: 2025-12-16T01:15:51.750

Link: CVE-2025-66449

cve-icon Redhat

No data.