Description
RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the `/api/raw` endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
https://github.com/rommapp/romm/security/advisories/GHSA-fx9g-xw4j-jwc3
Patch x_refsource_misc
https://github.com/rommapp/romm/commit/7c94cb05e74ddb6a6af7b82320686c01754e9966
Patch x_refsource_misc
https://github.com/rommapp/romm/commit/baa1a9759079c36e36a9f10c920c46b57d0b6151
Various Sources x_refsource_misc
https://github.com/rommapp/romm/blob/4.0.0-beta.2/backend/endpoints/raw.py#L31
Scores
CVSS v4
8.3
EPSS
0.0013
EPSS Percentile
31.4%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-26
Status
published
Products (2)
rommapp/romm
< 3.10.3
rommapp/romm
< 4.0.0-beta.3
Published
Jul 16, 2025
Tracked Since
Feb 18, 2026