CVE-2025-11842: Smidge is vulnerable to Path Traversal
6.3
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Smidge | nuget | < 4.6.0 | 4.6.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability, as described, is a path traversal issue in the 'Bundle Handler' related to the 'Version' argument. The analysis of the commits between the last vulnerable version (4.5.1) and the first patched version (4.6.0) revealed a key commit ca8575339bd77aeb3c754ca68263de30bd7a5cfa with the message 'Adds checks for file persistence'. This commit modifies the WriteFileAsync methods in src/Smidge.Core/Cache/PhysicalFileCacheFileSystem.cs. The changes introduce validation to the filePath parameter, preventing path traversal attacks. The added checks ensure that the file path for cached bundles, which is constructed using the user-provided 'Version', does not allow writing files outside the intended cache directory. The vulnerable functions are the two overloads of WriteFileAsync in the Smidge.Core.Cache.PhysicalFileCacheFileSystem class, as they were responsible for the insecure file writing operation before the patch.
Vulnerable functions
Smidge.Core.Cache.PhysicalFileCacheFileSystem.WriteFileAsyncsrc/Smidge.Core/Cache/PhysicalFileCacheFileSystem.cs