External Control of File Name or Path Affecting servicestack.text package, versions [,8.6.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DOTNET-SERVICESTACKTEXT-10500474
  • published25 Jun 2025
  • disclosed25 Jun 2025
  • creditPiotr Bazydlo

Introduced: 25 Jun 2025

NewCVE-2025-6444  (opens in a new tab)
CWE-73  (opens in a new tab)

How to fix?

Upgrade ServiceStack.Text to version 8.6.0 or higher.

Overview

ServiceStack.Text is a set of JSON, JSV and CSV text serializers

Affected versions of this package are vulnerable to External Control of File Name or Path in the url parameter to the GetErrorResponse method. An attacker can relay NTLM credentials in the context of the current user by supplying a URI with the file:// scheme.

Note: The package's developers point out that the security impact of this method's ability to access local file paths is minimal because such access is exposed by the native .Net WebRequest.Create(url) that this package provides a wrapper for. So no greater risk is introduced by the wrapper function.

CVSS Base Scores

version 4.0
version 3.1