Overview
A high-severity vulnerability has been identified in OpenC3 COSMOS 6.0.0, potentially allowing attackers to execute a directory traversal. This vulnerability, tracked as CVE-2025-28382, poses a significant risk to any organization utilizing the affected software as it can lead to system compromise or data leakage. Immediate action is required to mitigate the risk.
Vulnerability Summary
CVE ID: CVE-2025-28382
Severity: High (7.5)
Attack Vector: Network
Privileges Required: Low
User Interaction: None
Impact: System Compromise or Data Leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
OpenC3 COSMOS | 6.0.0
How the Exploit Works
The vulnerability resides in the openc3-api/tables endpoint of OpenC3 COSMOS 6.0.0. This vulnerability allows an attacker to manipulate the API endpoint with directory traversal sequences, ultimately enabling them to access unauthorized files or directories. An attacker can exploit this to gain access to sensitive information or execute arbitrary code, potentially leading to a full system compromise.
Conceptual Example Code
Below is a conceptual example of how this vulnerability might be exploited. This example uses a malicious HTTP POST request to the vulnerable endpoint, injecting directory traversal sequences into the request.
POST /openc3-api/tables/../../../etc/passwd HTTP/1.1
Host: target.example.com
Content-Type: application/json
{ "malicious_payload": "..." }
Mitigation Guidance
Users are advised to apply the latest vendor patches to address this vulnerability. In case patches are not immediately available, organizations can use a web application firewall (WAF) or intrusion detection system (IDS) to detect and block malicious traffic as a temporary mitigation measure. It’s crucial to stay updated with the latest security advisories from the vendor and apply patches as soon as they are released.

