Cyber Posture

CVE-2025-60946

High

Published: 23 March 2026

Published
23 March 2026
Modified
26 March 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated attacker could access unintended file directories. Fixed in 8.1.0 alpha.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the improper handling of arbitrary file path inputs by requiring validation to block path traversal sequences like '../'.

prevent

Enforces approved access authorizations to prevent authenticated users from accessing unintended file directories outside their privileges.

prevent

Requires timely identification, reporting, and correction of flaws like this path traversal vulnerability through patching to version 8.1.0.

Security SummaryAI

CVE-2025-60946 is a path traversal vulnerability (CWE-22) in Census CSWeb version 8.0.1, stemming from improper handling of arbitrary file path input. This flaw allows a remote, authenticated attacker to access unintended file directories on the server. The vulnerability was published on 2026-03-23 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.

A remote attacker with low-privilege authenticated access (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity and no user interaction required. Successful exploitation enables traversal of directory boundaries, potentially allowing read, modification, or deletion of sensitive files outside the intended scope, leading to unauthorized data exposure, tampering, or disruption of services.

Mitigation is available in Census CSWeb 8.1.0 alpha, as detailed in the fixing commit at https://github.com/csprousers/csweb/commit/eba0b59a243390a1a4f9524cce6dbc0314bf0d91. Additional resources include a CSAF advisory at https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2026/va-26-079-01.json, proof-of-concept exploits at https://github.com/hx381/cspro-exploits, and the official CVE record at https://www.cve.org/CVERecord?id=CVE-2025-60946. Security practitioners should upgrade to the patched version and review access controls for authenticated users.

Details

CWE(s)

Affected Products

csprousers
csweb
8.0.1

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
Why these techniques?

Path traversal in public-facing web app enables initial access via exploitation (T1190) and facilitates arbitrary file reads for data collection (T1005) and file/directory discovery (T1083).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References