The seffaflik thru 0.0.9 is vulnerable to symlink attacks due to incorrect default permissions given to the .kimlik file and .seffaflik file, which is created with mode 0777 and 0775 respectively, exposing secrets to other local users. Additionally, the .kimlik file is written without symlink checks, allowing local attackers to overwrite arbitrary files. This can result in information disclosure and denial of service.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 14:00:00 +0000

Type Values Removed Values Added
Description The seffaflik thru 0.0.9 is vulnerable to symlink attacks due to incorrect default permissions given to the .kimlik file and .seffaflik file, which is created with mode 0777 and 0775 respectively, exposing secrets to other local users. Additionally, the .kimlik file is written without symlink checks, allowing local attackers to overwrite arbitrary files. This can result in information disclosure and denial of service.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-22T13:53:59.423Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-61035

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-22T14:15:51.873

Modified: 2025-10-22T14:15:51.873

Link: CVE-2025-61035

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.