CVE-2025-24961: S3Proxy allows insecure path traversal in filesystem and filesystem-nio2 storage backends
(updated )
Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to authenticated clients.
References
- github.com/advisories/GHSA-2ccp-vqmv-4r4x
- github.com/apache/jclouds/commit/b0819e0ef5e08c792a4d1724b938714ce9503aa3
- github.com/gaul/s3proxy
- github.com/gaul/s3proxy/commit/86b6ee4749aa163a78e7898efc063617ed171980
- github.com/gaul/s3proxy/security/advisories/GHSA-2ccp-vqmv-4r4x
- nvd.nist.gov/vuln/detail/CVE-2025-24961
Detect and mitigate CVE-2025-24961 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →