Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-30673
PUBLISHED
More InfoOfficial Page
Assigner-CPANSec
Assigner Org ID-9b29abf9-4ab0-4765-b253-1875cd9b441e
View Known Exploited Vulnerability (KEV) details
Published At-01 Apr, 2025 | 02:02
Updated At-01 Apr, 2025 | 18:29
Rejected At-
▼CVE Numbering Authority (CNA)
Sub::HandlesVia for Perl allows untrusted code to be included from the current working directory

Sub::HandlesVia for Perl before 0.050002 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238. If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution. Sub::HandlesVia uses Mite to produce the affected code section due to CVE-2025-30672

Affected Products
Vendor
TOBYINK
Product
Sub::HandlesVia
Collection URL
https://cpan.org/modules
Package Name
Sub-HandlesVia
Repo
https://github.com/tobyink/p5-sub-handlesvia
Program Files
  • lib/Sub/HandlesVia/Mite.pm
Default Status
unaffected
Versions
Affected
  • From 0 before 0.050002 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-427CWE-427 Uncontrolled Search Path Element
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-38CAPEC-38 Leveraging/Manipulating Configuration File Search Paths
Solutions

Version 0.050002 of Sub::HandlesVia was released to address the issue. Users should update to the latest version.

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://metacpan.org/dist/Sub-HandlesVia/changes#L12
related
https://metacpan.org/release/TOBYINK/Sub-HandlesVia-0.050001/source/lib/Sub/HandlesVia/Mite.pm#L114
related
https://blogs.perl.org/users/todd_rinaldo/2016/11/what-happened-to-dot-in-inc.html
related
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found