A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user’s environment.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-69194 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2425773 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-09 08:15
Updated : 2026-03-05 20:09
NVD link : CVE-2025-69194
Mitre link : CVE-2025-69194
CVE.ORG link : CVE-2025-69194
JSON object : View
Products Affected
gnu
- wget2
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
