CVE-2025-30673

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-30673
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-30673.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-30673
Related
Published
2025-04-01T03:15:16Z
Modified
2025-05-17T11:51:58.427237Z
Summary
[none]
Details

Sub::HandlesVia for Perl before 0.050002 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238.

If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution.

Sub::HandlesVia uses Mite to produce the affected code section due to CVE-2025-30672

References

Affected packages

Debian:12 / libsub-handlesvia-perl

Package

Name
libsub-handlesvia-perl
Purl
pkg:deb/debian/libsub-handlesvia-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.050000-1+deb12u1

Affected versions

0.*

0.050000-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libsub-handlesvia-perl

Package

Name
libsub-handlesvia-perl
Purl
pkg:deb/debian/libsub-handlesvia-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.050002-1

Affected versions

0.*

0.050000-1
0.050000-2
0.050001-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}