CVE-2025-1584: Solon Path Traversal
(updated )
A vulnerability classified as problematic was found in opensolon Solon up to 3.0.8. This vulnerability affects unknown code of the file solon-projects/solon-web/solon-web-staticfiles/src/main/java/org/noear/solon/web/staticfiles/StaticMappings.java. The manipulation leads to path traversal: ‘../filedir’. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.9 is able to address this issue. The name of the patch is f46e47fd1f8455b9467d7ead3cdb0509115b2ef1. It is recommended to upgrade the affected component.
References
- github.com/advisories/GHSA-x8q6-cchr-p7m6
- github.com/opensolon/solon
- github.com/opensolon/solon/commit/f46e47fd1f8455b9467d7ead3cdb0509115b2ef1
- github.com/opensolon/solon/issues/332
- github.com/opensolon/solon/issues/332
- github.com/opensolon/solon/issues/332
- nvd.nist.gov/vuln/detail/CVE-2025-1584
- vuldb.com/?ctiid.296560
- vuldb.com/?id.296560
- vuldb.com/?submit.504454
Detect and mitigate CVE-2025-1584 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →