Intel

AIKIDO-2025-10421

ServiceStack.Text is vulnerable to External Control of File Name or Path

External Control of File Name or PathCVE-2025-6444

61

Medium Risk

This Affects:

DOTNETServiceStack.Text
6.0.0 - 8.5.2
Fixed in 8.6.0

TL;DR

Affected versions of this package are vulnerable to external control of file name or path through the url parameter in the GetErrorResponse method. An attacker can exploit this by supplying a file:// URI, potentially causing the application to relay NTLM credentials in the context of the current user. However, the maintainers note that the security impact is limited, as the same behavior exists in the underlying .NET WebRequest.Create(url) method that this package wraps, and no additional risk is introduced by the wrapper itself.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

ServiceStack.Text is vulnerable to External Control of File Name or Path in versions 6.0.0 - 8.5.2.

How to fix this

Upgrade the ServiceStack.Text library to the patch version.

Background Info