An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level.
https://lists.debian.org/debian-lts-announce/2025/01/msg00029.html
https://lists.debian.org/debian-lts-announce/2025/01/msg00028.html
https://gitlab.com/flightgear/simgear/-/commit/5bb023647114267141a7610e8f1ca7d6f4f5a5a8
https://gitlab.com/flightgear/flightgear/-/issues/3025
https://gitlab.com/flightgear/flightgear/-/commit/ad37afce28083fad7f79467b3ffdead753584358
Source: Mitre, NVD
Published: 2025-01-28
Updated: 2025-08-06
Base Score: 9
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 9.9
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Severity: Critical
EPSS: 0.00024