The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-59352

CVE-2025-59352: Linuxfoundation Dragonfly RCE Vulnerability

CVE-2025-59352 is a remote code execution vulnerability in Linuxfoundation Dragonfly that allows malicious peers to create files in arbitrary locations and steal secret data. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: March 11, 2026

CVE-2025-59352 Overview

CVE-2025-59352 is a path traversal vulnerability affecting Dragonfly, an open source peer-to-peer (P2P) based file distribution and image acceleration system maintained by the Linux Foundation. The vulnerability exists in the gRPC API and HTTP APIs, which allow peers to send malicious requests that force the recipient peer to create files in arbitrary file system locations and read arbitrary files. This enables attackers to steal sensitive data from other peers and potentially achieve remote code execution (RCE) on vulnerable machines.

Critical Impact

This path traversal vulnerability allows unauthorized file read/write operations and remote code execution across the P2P network, potentially compromising multiple peer nodes and exposing sensitive data.

Affected Products

  • linuxfoundation dragonfly versions prior to 2.1.0
  • Dragonfly Go implementations (cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*)
  • P2P file distribution deployments using vulnerable Dragonfly versions

Discovery Timeline

  • 2025-09-17 - CVE CVE-2025-59352 published to NVD
  • 2025-09-18 - Last updated in NVD database

Technical Details for CVE-2025-59352

Vulnerability Analysis

This vulnerability is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), commonly known as path traversal or directory traversal. The flaw resides in how Dragonfly's gRPC API and HTTP APIs process file path inputs from peer nodes within the P2P network.

The vulnerable code fails to properly validate and sanitize file paths received from peers, allowing malicious actors to craft requests containing directory traversal sequences (such as ../) that escape the intended file system boundaries. This enables two primary attack scenarios: arbitrary file read operations that can expose sensitive configuration files, credentials, and other confidential data; and arbitrary file write operations that can overwrite critical system files or plant malicious code for subsequent execution.

Root Cause

The root cause lies in insufficient input validation within Dragonfly's API handlers. When processing peer requests for file operations, the application does not adequately sanitize or validate file path parameters before performing file system operations. This allows path traversal sequences to be processed, enabling attackers to reference files outside the designated working directories.

Attack Vector

The attack is network-based, requiring the attacker to have network access to the Dragonfly P2P infrastructure. An attacker operating as a peer within the Dragonfly network can send specially crafted gRPC or HTTP requests to other peers. These requests contain path traversal sequences that direct the victim peer to read from or write to arbitrary locations on the file system.

The attack flow typically involves:

  1. The attacker joins the Dragonfly P2P network as a peer
  2. The attacker identifies target peers within the network
  3. Malicious requests containing path traversal payloads are sent via gRPC or HTTP APIs
  4. The victim peer processes these requests without proper path validation
  5. The attacker can then exfiltrate sensitive files or write malicious payloads to achieve RCE

Since no public exploit is currently available and the vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog, exploitation in the wild has not been confirmed. However, organizations should treat this as a serious security concern given the potential for data theft and remote code execution.

Detection Methods for CVE-2025-59352

Indicators of Compromise

  • Unusual file access patterns in Dragonfly peer logs, particularly reads of system files like /etc/passwd, /etc/shadow, or application configuration files
  • File write operations to unexpected directories outside the Dragonfly data paths
  • gRPC or HTTP requests containing path traversal sequences (../, ..%2f, ..%252f)
  • Unexpected new files appearing in system directories or cron locations

Detection Strategies

  • Implement log analysis rules to detect path traversal patterns in API request logs
  • Monitor file system integrity using tools like AIDE or OSSEC to detect unauthorized file modifications
  • Deploy network-level inspection to identify gRPC and HTTP requests containing suspicious path components
  • Enable audit logging on critical system directories to track unauthorized access attempts

Monitoring Recommendations

  • Configure alerting for file operations outside designated Dragonfly directories
  • Implement real-time monitoring of Dragonfly peer communication patterns
  • Establish baseline behavior for peer-to-peer API requests to detect anomalies
  • Monitor for unexpected outbound data transfers that could indicate data exfiltration

How to Mitigate CVE-2025-59352

Immediate Actions Required

  • Upgrade Dragonfly to version 2.1.0 or later immediately
  • Audit existing Dragonfly deployments for signs of compromise
  • Restrict network access to Dragonfly APIs using firewall rules
  • Review file system permissions to limit the impact of potential exploitation

Patch Information

The vulnerability is fixed in Dragonfly version 2.1.0. Organizations should upgrade to this version or later to remediate the vulnerability. The fix implements proper path validation and sanitization for all file operations processed through the gRPC and HTTP APIs.

For detailed information about the security fix, consult the GitHub Security Advisory GHSA-79hx-3fp8-hj66 and the Dragonfly 2023 Security Report.

Workarounds

  • Implement network segmentation to isolate Dragonfly peers from untrusted network segments
  • Deploy a reverse proxy with path validation rules to filter malicious requests before they reach Dragonfly
  • Use containerization with read-only file systems where possible to limit write capabilities
  • Apply the principle of least privilege to the Dragonfly service account to minimize file system access
bash
# Configuration example - Restrict Dragonfly network access using iptables
# Allow only trusted peer IP ranges to access Dragonfly gRPC port (default 65000)
iptables -A INPUT -p tcp --dport 65000 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 65000 -j DROP

# Run Dragonfly with reduced privileges and restricted file system access
# Example systemd service hardening options
# ReadOnlyDirectories=/
# ReadWriteDirectories=/var/lib/dragonfly
# PrivateTmp=true
# NoNewPrivileges=true

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechLinuxfoundation Dragonfly

  • SeverityMEDIUM

  • CVSS Score6.9

  • EPSS Probability0.80%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-22
  • Technical References
  • Dragonfly 2023 Security Report
  • Vendor Resources
  • GitHub Security Advisory GHSA-79hx-3fp8-hj66
  • Related CVEs
  • CVE-2025-59345: Dragonfly Manager DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English