Cyber Posture

CVE-2025-24888

High

Published: 13 February 2025

Published
13 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0315 87.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may add or modify XDG Autostart Entries to execute malicious programs or commands when a user’s desktop environment is loaded at login.

Security Summary

CVE-2025-24888 is a path traversal vulnerability (CWE-22) in the SecureDrop Client prior to version 0.14.1, a desktop application used by journalists to communicate with sources and handle submissions on the SecureDrop Workstation. The issue resides in the reply download functionality within the sd-app Qubes virtual machine, where the filename derived from the server's Content-Disposition HTTP header determines the initial write location for the encrypted reply file on disk. Although filenames are generated and sanitized server-side, a malicious server can specify a traversing path, and a subsequent safe_move() check fails to relocate the file, leaving it in the arbitrary location.

Exploitation requires an attacker to first compromise the target organization's SecureDrop Server, a dedicated physical machine hardened with multiple layers and exposed only via Tor hidden services (and optionally SSH). With server control, the attacker can craft a reply's HTTP response to write the encrypted file to a directory like /home/user/.config/autostart/, enabling autostart execution and remote code execution on the client sd-app VM. The private OpenPGP key remains isolated in a separate VM, and uncompromised remote attackers, such as fake sources, cannot trigger this due to encryption and sanitization.

Version 0.14.1 of the SecureDrop Client fixes the vulnerability. The GitHub security advisory (GHSA-6c3p-chq6-q3j2) and fixing commit (120bac14649db0bcf5f24f2eb82731c76843b1ba) detail the patch, which addresses the unsafe initial write before path validation.

As of publication on 2025-02-13, no evidence of real-world exploitation exists, and the high CVSS score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects the need for server compromise as a prerequisite.

Details

CWE(s)
CWE-22

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1547.013 XDG Autostart Entries Persistence
Adversaries may add or modify XDG Autostart Entries to execute malicious programs or commands when a user’s desktop environment is loaded at login.
Why these techniques?

Path traversal in client download enables arbitrary file write to autostart directory for execution (T1547.013) and directly supports exploitation of client application vulnerability for RCE (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References