HPE StoreOnce, Directory Traversal Arbitrary File Deletion, CVE-2025-37094 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-37094 is a critical directory traversal vulnerability in HPE StoreOnce Software, allowing attackers to delete arbitrary files via crafted path traversal sequences. The flaw arises from insufficient input validation when handling file operations, enabling unauthorized access to sensitive system files. Attackers exploit this by manipulating file paths (e.g., `../../` sequences) to bypass restrictions and delete critical data, potentially disrupting backups or causing system instability. The vulnerability is remotely exploitable with low complexity, requiring no user interaction, and impacts confidentiality, integrity, and availability.

DailyCVE Form

Platform: HPE StoreOnce
Version: Vulnerable versions prior to patch
Vulnerability: Directory Traversal
Severity: Critical
Date: 06/02/2025

Prediction: Patch expected by 08/15/2025

What Undercode Say

Analytics

Check for vulnerable StoreOnce versions
hpe_storeonce_check --version
Log analysis for traversal attempts
grep -r "../../" /var/log/storeonce/

How Exploit

DELETE /api/files?path=../../../../etc/passwd HTTP/1.1
Host: <target>

Protection from this CVE

  • Apply HPE’s official patch immediately.
  • Restrict filesystem permissions for StoreOnce services.
  • Monitor logs for unusual file deletion patterns.

Impact

  • Unauthorized system file deletion.
  • Backup corruption or loss.
  • Service disruption leading to downtime.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top