CVE-2025-13706

Source
https://cve.org/CVERecord?id=CVE-2025-13706
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13706.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-13706
Published
2025-12-23T22:15:45.190Z
Modified
2025-12-31T10:10:32.596625Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Tencent PatrickStar merge_checkpoint Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent PatrickStar. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the merge_checkpoint endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27182.

References

Affected packages

Git / github.com/tencent/patrickstar

Affected ranges

Type
GIT
Repo
https://github.com/tencent/patrickstar
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.1.0
v0.2.0
v0.3.0
v0.4.2
v0.4.3
v0.4.4
v0.4.5
v0.4.6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13706.json"