Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6h2f-wjhf-4wjx | Pyrofork has a Path Traversal in download_media Method |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyrofork Project
Pyrofork Project pyrofork |
|
| Vendors & Products |
Pyrofork Project
Pyrofork Project pyrofork |
Thu, 11 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pyrofork is a modern, asynchronous MTProto API framework. Versions 2.3.68 and earlier do not properly sanitize filenames received from Telegram messages in the download_media method before using them in file path construction. When downloading media, if the user does not specify a custom filename (which is the common/default usage), the method falls back to using the file_name attribute from the media object. The attribute originates from Telegram's DocumentAttributeFilename and is controlled by the message sender. This issue is fixed in version 2.3.69. | |
| Title | Pyrofork has a Path Traversal in download_media Method | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-11T15:35:02.068Z
Reserved: 2025-12-10T18:46:14.762Z
Link: CVE-2025-67720
Updated: 2025-12-11T15:34:53.708Z
Status : Received
Published: 2025-12-11T02:16:19.090
Modified: 2025-12-11T02:16:19.090
Link: CVE-2025-67720
No data.
OpenCVE Enrichment
Updated: 2025-12-11T21:37:52Z
Github GHSA