Overview
OpenC3 COSMOS 6.0.0 users need to be aware of a severe vulnerability that has been recently identified – CVE-2025-28384. It’s a critical directory traversal issue that resides in the /script-api/scripts/ endpoint of the software. This vulnerability is of particular concern as it allows malicious attackers to execute directory traversal, potentially leading to system compromise or data leakage. Given the high CVSS Severity Score of 9.1, this issue should not be taken lightly and immediate preventative measures are crucial.
Vulnerability Summary
CVE ID: CVE-2025-28384
Severity: Critical (9.1 CVSS score)
Attack Vector: Network
Privileges Required: Low
User Interaction: None
Impact: System compromise and potential data leakage
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
OpenC3 COSMOS | 6.0.0
How the Exploit Works
The exploit works by manipulating the /script-api/scripts/ endpoint of OpenC3 COSMOS 6.0.0. The attacker sends a specifically crafted request that contains directory traversal characters. In this case, OpenC3 COSMOS fails to properly sanitize the request, thereby allowing the attacker to gain unauthorized access to directories that should not be accessible. This could potentially reveal sensitive data or provide an opportunity for further attacks.
Conceptual Example Code
Below is a conceptual example of how the vulnerability might be exploited. This is a sample HTTP request that includes directory traversal characters in the request:
GET /script-api/scripts/../../../etc/passwd HTTP/1.1
Host: target.example.com
Content-Type: application/json
This request attempts to access the “/etc/passwd” file in the server, which contains sensitive information about user accounts.
Mitigation Guidance
It is advised to apply the vendor patch as soon as it is available. In the meantime, as temporary mitigation, a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can be used to monitor and block suspicious requests to the vulnerable endpoint. Regular monitoring of system logs should also be carried out to detect any unauthorized attempts to access the system.
