The vulnerability CVE-2025-28382 is a directory traversal flaw in the 'openc3-api/tables' endpoint of OpenC3 COSMOS 6.0.0. According to the VisionSpace security assessment, this endpoint allows unauthenticated attackers (CVSS PR:N) to perform arbitrary file reads, deletions, and copies due to improper sanitization of path parameters in the URL.
The identified vulnerable functions are the handlers within the openc3-cosmos-tool-iframe Ruby gem (part of OpenC3 COSMOS) responsible for processing GET, DELETE, and PUT requests to this endpoint. Specifically:
- A function (hypothesized as
OpenC3::Api::TablesController#show) handles file reads (GET requests).
- A function (hypothesized as
OpenC3::Api::TablesController#destroy) handles file deletions (DELETE requests).
- A function (hypothesized as
OpenC3::Api::TablesController#save_as) handles file copies (PUT requests with a 'save-as' directive).
These functions take path components directly from the URL and use them in file system operations. The lack of sanitization allows attackers to inject '..' sequences to navigate outside the intended directory, leading to unauthorized access. The function names and file paths are inferred based on common Ruby (specifically Rails-like) conventions for API endpoint handling and the specified affected gem, as direct source code patches were not available for analysis. The confidence is medium due to these inferences, but the vulnerable behavior of the endpoint is well-documented in the provided security assessment.