CVE-2020-25265

MEDIUM

AppImage libappimage <1.0.3 - Path Traversal

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2020-25265. PoCs published by refi64.

AI-analyzed exploit summary This PoC exploits CVE-2020-25265 and CVE-2020-25266 by embedding an ELF executable and AppImage headers in an MP3 file, which is then used to override a system-installed application via a malicious desktop file. The exploit leverages libappimage's lack of validation for the 'Name' field in desktop files.

Description

AppImage libappimage before 1.0.3 allows attackers to trigger an overwrite of a system-installed .desktop file by providing a .desktop file that contains Name= with path components.

Exploits (1)

nomisec WORKING POC 2 stars
by refi64 · poc
https://github.com/refi64/CVE-2020-25265-25266

This PoC exploits CVE-2020-25265 and CVE-2020-25266 by embedding an ELF executable and AppImage headers in an MP3 file, which is then used to override a system-installed application via a malicious desktop file. The exploit leverages libappimage's lack of validation for the 'Name' field in desktop files.

Classification
Working Poc 90%
Attack Type
Other
Complexity
Moderate
Reliability
Reliable
Target: libappimage < 1.0.3, appimaged (all versions)
No auth needed
Prerequisites: Dart SDK · FreePascal · MP3 file
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (1)

Core 1
Core References
Third Party Advisory x_refsource_misc
https://github.com/refi64/CVE-2020-25265-25266

Scores

CVSS v3 6.5
EPSS 0.0682
EPSS Percentile 91.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Details

Status published
Products (1)
appimage/libappimage < 1.0.3
Published Dec 02, 2020
Tracked Since Feb 18, 2026