Description
Pyrofork is a modern, asynchronous MTProto API framework. Versions 2.3.68 and earlier do not properly sanitize filenames received from Telegram messages in the download_media method before using them in file path construction. When downloading media, if the user does not specify a custom filename (which is the common/default usage), the method falls back to using the file_name attribute from the media object. The attribute originates from Telegram's DocumentAttributeFilename and is controlled by the message sender. This issue is fixed in version 2.3.69.
INFO
Published Date :
2025-12-11T01:25:46.459Z
Last Modified :
2025-12-11T15:35:02.068Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-67720 vulnerability.
| Vendors | Products |
|---|---|
| Pyrofork Project |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-67720.