CVE-2025-14311
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in JMRI.This issue affects JMRI: before 5.13.3.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
JMRI before 5.13.3 allows path traversal via malicious ZIP files, enabling arbitrary file overwrite or code execution.
Vulnerability \- Path Traversal in ZIP extraction
The JMRI application, a model railroad control software project, contains a Zip Slip vulnerability (CWE-22: Path Traversal) in the unzipFunction() within unzip_cloned.java [1]. The vulnerable code constructs destination file paths directly from ZIP entry names without validation, allowing entries like ../../../etc/passwd to escape the intended extraction directory [1].
Exploitation
An attacker can exploit this by crafting a malicious ZIP file containing entries with path traversal sequences. The vulnerability can be triggered when JMRI processes such a ZIP file, which may occur when importing custom panels, configuration files, or during remote access using built-in JMRI services [1]. No authentication is required if the application is exposed to untrusted ZIP files.
Impact
Successful exploitation permits arbitrary file write to locations outside the extraction directory. This could lead to overwriting critical application files or system files (such as user credentials or startup scripts), potentially resulting in remote code execution or privilege escalation [1].
Mitigation
The issue is fixed in JMRI version 5.13.3, which includes proper path normalization and validation: file.toPath().normalize() and startsWith(directory.toPath().normalize()) ensure the final path remains within the target directory [1]. Users should upgrade to the latest version; no workaround is provided for earlier releases.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
2f64a88e8b89ae59ac153822bVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
1News mentions
0No linked articles in our index yet.