{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-7107","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-07-05T19:27:06.479Z","datePublished":"2025-07-07T02:02:07.997Z","dateUpdated":"2025-07-07T15:37:13.337Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-07-07T02:02:07.997Z"},"title":"SimStudioAI sim route.ts handleLocalFile path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"SimStudioAI","product":"sim","versions":[{"version":"0.1.0","status":"affected"},{"version":"0.1.1","status":"affected"},{"version":"0.1.2","status":"affected"},{"version":"0.1.3","status":"affected"},{"version":"0.1.4","status":"affected"},{"version":"0.1.5","status":"affected"},{"version":"0.1.6","status":"affected"},{"version":"0.1.7","status":"affected"},{"version":"0.1.8","status":"affected"},{"version":"0.1.9","status":"affected"},{"version":"0.1.10","status":"affected"},{"version":"0.1.11","status":"affected"},{"version":"0.1.12","status":"affected"},{"version":"0.1.13","status":"affected"},{"version":"0.1.14","status":"affected"},{"version":"0.1.15","status":"affected"},{"version":"0.1.16","status":"affected"},{"version":"0.1.17","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in SimStudioAI sim up to 0.1.17. Affected is the function handleLocalFile of the file apps/sim/app/api/files/parse/route.ts. The manipulation of the argument filePath leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as b2450530d1ddd0397a11001a72aa0fde401db16a. It is recommended to apply a patch to fix this issue."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in SimStudioAI sim bis 0.1.17 entdeckt. Dabei betrifft es die Funktion handleLocalFile der Datei apps/sim/app/api/files/parse/route.ts. Dank der Manipulation des Arguments filePath mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Der Patch wird als b2450530d1ddd0397a11001a72aa0fde401db16a bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-07-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-07-05T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-07-05T21:33:13.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.315018","name":"VDB-315018 | SimStudioAI sim route.ts handleLocalFile path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.315018","name":"VDB-315018 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.601043","name":"Submit #601043 | SimStudioAI Sim <=0.1.17 Absolute Path Traversal","tags":["third-party-advisory"]},{"url":"https://github.com/vri-report/reports/issues/2","tags":["issue-tracking"]},{"url":"https://github.com/simstudioai/sim/pull/437","tags":["issue-tracking"]},{"url":"https://github.com/vri-report/reports/issues/2#issue-3161840085","tags":["exploit","issue-tracking"]},{"url":"https://github.com/simstudioai/sim/commit/b2450530d1ddd0397a11001a72aa0fde401db16a","tags":["patch"]}]},"adp":[{"references":[{"url":"https://github.com/vri-report/reports/issues/2","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-07T15:37:09.983980Z","id":"CVE-2025-7107","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-07T15:37:13.337Z"}}]}}