CVE-2025-69194

A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user’s environment.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2025-69194 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2425773 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:wget2:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-09 08:15

Updated : 2026-03-05 20:09


NVD link : CVE-2025-69194

Mitre link : CVE-2025-69194

CVE.ORG link : CVE-2025-69194


JSON object : View

Products Affected

gnu

  • wget2
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')