Solon, Directory Traversal & XSS, CVE-2025-46096 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-46096 is a critical directory traversal vulnerability in Solon v3.1.2, specifically within the `solon-faas-luffy` component. An attacker can exploit improper path sanitization to traverse directories and inject malicious scripts, leading to cross-site scripting (XSS) attacks. The flaw occurs when processing metrics data, allowing unauthorized file access or remote code execution via crafted HTTP requests. The lack of input validation enables attackers to bypass security controls and compromise the system.

DailyCVE Form

Platform: Solon
Version: 3.1.2
Vulnerability: Directory Traversal → XSS
Severity: Critical
Date: 06/23/2025

Prediction: Patch by 07/15/2025

What Undercode Say

Analytics:

curl -X GET "http://target/metrics?path=../../../etc/passwd"
grep -r "solon-faas-luffy" /var/log/solon

Exploit:

import requests
payload = "../../../malicious.js"
response = requests.get(f"http://victim.com/metrics?path={payload}")

Protection:

  • Update to Solon v3.1.3+
  • Implement strict input validation
  • Disable `solon-faas-luffy` if unused

Impact:

  • Remote code execution
  • Data exfiltration
  • System compromise

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top