CVE-2025-66449
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
16/12/2025
Last modified:
07/01/2026
Description
ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:c4illin:convertx:*:*:*:*:*:*:*:* | 0.16.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/C4illin/ConvertX/blob/4ae2aab66ace7cdcc14c5a16ecaaf2372b9ccbdf/src/pages/upload.tsx#L27-L30
- https://github.com/C4illin/ConvertX/commit/550f472451755d095cf5802bc91f403e85b7129e
- https://github.com/C4illin/ConvertX/security/advisories/GHSA-cpww-gwgc-p72r
- https://github.com/C4illin/ConvertX/security/advisories/GHSA-cpww-gwgc-p72r



