Listen to this Post
How the CVE Works
CVE-2025-37094 is a critical directory traversal vulnerability in HPE StoreOnce Software, allowing attackers to delete arbitrary files via crafted path traversal sequences. The flaw arises from insufficient input validation when handling file operations, enabling unauthorized access to sensitive system files. Attackers exploit this by manipulating file paths (e.g., `../../` sequences) to bypass restrictions and delete critical data, potentially disrupting backups or causing system instability. The vulnerability is remotely exploitable with low complexity, requiring no user interaction, and impacts confidentiality, integrity, and availability.
DailyCVE Form
Platform: HPE StoreOnce
Version: Vulnerable versions prior to patch
Vulnerability: Directory Traversal
Severity: Critical
Date: 06/02/2025
Prediction: Patch expected by 08/15/2025
What Undercode Say
Analytics
Check for vulnerable StoreOnce versions hpe_storeonce_check --version Log analysis for traversal attempts grep -r "../../" /var/log/storeonce/
How Exploit
DELETE /api/files?path=../../../../etc/passwd HTTP/1.1 Host: <target>
Protection from this CVE
- Apply HPEβs official patch immediately.
- Restrict filesystem permissions for StoreOnce services.
- Monitor logs for unusual file deletion patterns.
Impact
- Unauthorized system file deletion.
- Backup corruption or loss.
- Service disruption leading to downtime.
Sources:
Reported By: nvd.nist.gov
Extra Source Hub:
Undercode