CVE-2025-59352

Dragonfly · Dragonfly is an open source Multiple Products

A critical vulnerability has been discovered in Dragonfly, an open-source file distribution system.

Executive summary

A critical vulnerability has been discovered in Dragonfly, an open-source file distribution system. This flaw allows a remote, unauthenticated attacker to force a vulnerable system to create arbitrary files, which could lead to a complete system compromise, allowing the attacker to execute malicious code, steal data, or cause a denial of service. Due to its critical severity and the ease of exploitation, immediate remediation is required to prevent a potential breach.

Vulnerability

The vulnerability exists within the gRPC and HTTP API endpoints of Dragonfly. Due to insufficient input validation, an unauthenticated attacker on the network can send a specially crafted request to a vulnerable peer. This request forces the recipient system to create an arbitrary file at an arbitrary location on the filesystem, a condition known as an arbitrary file write. A threat actor could exploit this to write a malicious script (e.g., a webshell or cron job) to a sensitive directory, leading to remote code execution (RCE) with the privileges of the Dragonfly service account.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could have a catastrophic impact on the business, leading to a full compromise of the affected server. Potential consequences include the theft of sensitive corporate or customer data, deployment of ransomware, complete disruption of services relying on Dragonfly, and the compromised system being used as a pivot point for further attacks into the internal network. The reputational and financial damage resulting from such a breach would be significant.

Remediation

Immediate Action: Immediately upgrade all instances of Dragonfly to version 2.1.0 or later, which contains the patch for this vulnerability. After updating, carefully review access logs for any anomalous requests to the gRPC and HTTP APIs that may indicate past or ongoing exploitation attempts.

Proactive Monitoring: Implement enhanced monitoring for Dragonfly servers. Security teams should look for:

  • Unusual or malformed requests to the Dragonfly gRPC/HTTP APIs in network traffic and access logs.
  • Unexpected file creation events in system-critical directories (e.g., /etc, /bin, /var/www/html).
  • Spikes in disk I/O or rapid decreases in available disk space, which could indicate a denial-of-service attempt.
  • Unusual outbound network connections originating from the Dragonfly server process.

Compensating Controls: If immediate patching is not feasible, apply the following controls to reduce risk:

  • Restrict network access to the Dragonfly gRPC and HTTP API ports, allowing connections only from explicitly trusted IP addresses or network segments.
  • Deploy a Web Application Firewall (WAF) or Intrusion Prevention System (IPS) with rules designed to inspect and block malicious payloads targeting this vulnerability.
  • Implement File Integrity Monitoring (FIM) on critical system directories to alert on any unauthorized file modifications or creations.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical severity (CVSS 9.8) of this vulnerability, we recommend that organizations treat its remediation as the highest priority. A successful exploit would grant an attacker complete control over the affected system. Although CVE-2025-59352 is not currently listed on the CISA KEV catalog, its characteristics make it a prime candidate for future inclusion. All vulnerable instances of Dragonfly must be updated to version 2.1.0 or later without delay to mitigate the risk of compromise.