May 23 Advisory: Srimax Output Messenger Directory Traversal Vulnerability Added to CISA KEV [CVE-2025-27920]

Rapid Response

Vulnerability Description

CVE-2025-27920 is a directory traversal vulnerability in Srimax Output Messenger before version 2.0.63, with a CVSS score of 6.5. 

This vulnerability enables remote attackers to access or execute arbitrary files by manipulating file paths using  ../  sequences. Successful exploitation can allow an attacker to escape the intended directory structure, potentially exposing or modifying sensitive server files.

Threat Activity

According to Microsoft’s Threat Intelligence team, a threat actor they track as Marbled Dust has been actively exploiting unpatched instances of Output Messenger since April 2024. While Microsoft has also disclosed a second vulnerability, CVE-2025-27921 impacting the Output Messenger, no exploitation of that flaw has been observed to date. CISA added CVE-2025-27920 to its Known Exploited Vulnerabilities (KEV) catalog on May 19, 2025. 

FieldDetails
CVE-IDCVE-2025-27920 – CVSS 6.5 (medium) – assigned by CISA-ADP
Vulnerability DescriptionOutput Messenger before 2.0.63 is vulnerable to a directory traversal attack due to improper file path handling. 
Date of DisclosureDecember 25, 2024 
Date Reported as Actively ExploitedMay 19, 2025
Affected AssetsSrimax Output Messenger
Vulnerable Software Versions Version 2.0.63. 
PoC Available?We did not observe any public exploits available at the time of writing. 
Exploitation StatusThreat activity related to this vulnerability was observed in April 2024 by Microsoft’s Threat Intelligence team and attributed to a group they track as Marbled Dust. This vulnerability was added to CISA KEV on May 19, 2025. 
Patch StatusSrimax has provided instructions for downloading Output Messenger version 2.0.63 in their security advisory.  

Censys Perspective

As of this writing, Censys has identified 827 exposed Output Messenger instances that may be vulnerable. Of these exposed devices, 620 appear to be running a version susceptible to the vulnerability. The ten most common vulnerable versions observed are listed below:

VersionHost Count
2.0.15.0127
2.0.22.0127
2.0.18.099
2.0.23.043
2.0.0.031
2.0.10.027
1.9.51.023
2.0.41.022
2.0.61.020
2.0.50.020

The queries below can be used to identify internet-facing instances of Srimax Output Messenger, but they are not necessarily vulnerable to the exploit. 

Censys Platform Query:

host.services.software: (vendor: "Srimax" and product: "Output Messenger") or web.software: (vendor: "Srimax" and product: "Output Messenger")

Censys Legacy Search Query:

services.software: (vendor="Srimax" and product="Output Messenger") 

Censys ASM Query:

host.services.software: (vendor="Srimax" and product="Output Messenger") or web_entity.instances.software: (vendor="Srimax" and product="Output Messenger")
srimax.png
Map of Exposed Vulnerable Output Messenger Devices

References

Subscribe to our blog