{"id":86560,"date":"2026-02-26T21:34:02","date_gmt":"2026-02-26T21:34:02","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T06:00:00","slug":"cve-2025-27022-path-traversal-vulnerability-in-infinera-g42-webgui-http-endpoint","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-27022-path-traversal-vulnerability-in-infinera-g42-webgui-http-endpoint\/","title":{"rendered":"<strong>CVE-2025-27022: Path Traversal Vulnerability in Infinera G42 WebGUI HTTP Endpoint<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The vulnerability, identified as CVE-2025-27022, is a significant path traversal vulnerability that affects the WebGUI HTTP endpoint in Infinera G42 version R6.1.3. This vulnerability is significant as it allows remote authenticated users to potentially download all OS files via HTTP requests, highlighting a potential risk of system compromise and data leakage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-27022<br \/>\nSeverity: High (7.5 CVSS)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: User level<br \/>\nUser Interaction: Required<br \/>\nImpact: System compromise, data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-651079248\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Infinera G42 | R6.1.3<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit leverages a path traversal vulnerability in the WebGUI HTTP endpoint. This vulnerability stems from a lack of sufficient validation of user-supplied input. The flaw allows authenticated users to access all files on the target machine file system that are readable to the user account used to run the httpd service. This means that a malicious authenticated user could potentially download all readable files on the system via HTTP requests.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-1472170092\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>The vulnerability might be exploited using a crafted HTTP request like the one below:<\/p>\n<pre><code class=\"\" data-line=\"\">GET \/..\/..\/..\/etc\/passwd HTTP\/1.1\nHost: target.example.com\nAuthorization: Basic [Base64-encoded-credentials]<\/code><\/pre>\n<p>In this example, the &#8220;GET&#8221; request attempts to traverse the file system to reach the &#8220;\/etc\/passwd&#8221; file, a common target for attacks due to its sensitive content. The &#8220;Authorization&#8221; header includes Base64-encoded credentials for an authenticated user.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The vulnerability, identified as CVE-2025-27022, is a significant path traversal vulnerability that affects the WebGUI HTTP endpoint in Infinera G42 version R6.1.3. This vulnerability is significant as it allows remote authenticated users to potentially download all OS files via HTTP requests, highlighting a potential risk of system compromise and data leakage. Vulnerability Summary CVE [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-86560","post","type-post","status-publish","format-standard","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/86560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=86560"}],"version-history":[{"count":0,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/86560\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=86560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=86560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=86560"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=86560"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=86560"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=86560"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=86560"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=86560"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=86560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}