CVE Vulnerabilities

CVE-2025-55247

Improper Link Resolution Before File Access ('Link Following')

Published: Oct 14, 2025 | Modified: Oct 23, 2025
CVSS 3.x
7.3
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.3 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Improper link resolution before file access (link following) in .NET allows an authorized attacker to elevate privileges locally.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
.netMicrosoft8.0.0 (including)8.0.21 (excluding)
.netMicrosoft9.0.0 (including)9.0.10 (excluding)
Red Hat Enterprise Linux 10RedHatdotnet8.0-0:8.0.121-1.el10_0*
Red Hat Enterprise Linux 10RedHatdotnet9.0-0:9.0.111-1.el10_0*
Red Hat Enterprise Linux 10RedHatdotnet10.0-0:10.0.100~rc.2.25502.107-0.12.el10_1*
Red Hat Enterprise Linux 8RedHatdotnet8.0-0:8.0.121-1.el8_10*
Red Hat Enterprise Linux 8RedHatdotnet9.0-0:9.0.111-1.el8_10*
Red Hat Enterprise Linux 9RedHatdotnet10.0-0:10.0.100~rc.2.25502.107-0.10.el9_7*
Red Hat Enterprise Linux 9RedHatdotnet8.0-0:8.0.121-1.el9_6*
Red Hat Enterprise Linux 9RedHatdotnet9.0-0:9.0.111-1.el9_6*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatdotnet8.0-0:8.0.121-1.el9_4*
Red Hat OpenShift Dev Spaces (RHOSDS) 3.25RedHatdevspaces/udi-rhel9:sha256:ef84715a61474b7a45b0b24c0d30370f51ab93ff86b70d5d345545253e01c3ae*
Dotnet10Ubuntudevel*
Dotnet10Ubuntuplucky*
Dotnet10Ubuntuquesting*
Dotnet7Ubuntujammy*
Dotnet8Ubuntujammy*
Dotnet8Ubuntunoble*
Dotnet8Ubuntuplucky*
Dotnet8Ubuntuquesting*
Dotnet9Ubuntuplucky*
Dotnet9Ubuntuquesting*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References