CVE-2025-60946
Published: 23 March 2026
Description
Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated attacker could access unintended file directories. Fixed in 8.1.0 alpha.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the improper handling of arbitrary file path inputs by requiring validation to block path traversal sequences like '../'.
Enforces approved access authorizations to prevent authenticated users from accessing unintended file directories outside their privileges.
Requires timely identification, reporting, and correction of flaws like this path traversal vulnerability through patching to version 8.1.0.
Security SummaryAI
CVE-2025-60946 is a path traversal vulnerability (CWE-22) in Census CSWeb version 8.0.1, stemming from improper handling of arbitrary file path input. This flaw allows a remote, authenticated attacker to access unintended file directories on the server. The vulnerability was published on 2026-03-23 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.
A remote attacker with low-privilege authenticated access (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity and no user interaction required. Successful exploitation enables traversal of directory boundaries, potentially allowing read, modification, or deletion of sensitive files outside the intended scope, leading to unauthorized data exposure, tampering, or disruption of services.
Mitigation is available in Census CSWeb 8.1.0 alpha, as detailed in the fixing commit at https://github.com/csprousers/csweb/commit/eba0b59a243390a1a4f9524cce6dbc0314bf0d91. Additional resources include a CSAF advisory at https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2026/va-26-079-01.json, proof-of-concept exploits at https://github.com/hx381/cspro-exploits, and the official CVE record at https://www.cve.org/CVERecord?id=CVE-2025-60946. Security practitioners should upgrade to the patched version and review access controls for authenticated users.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing web app enables initial access via exploitation (T1190) and facilitates arbitrary file reads for data collection (T1005) and file/directory discovery (T1083).