Agiloft Release 28 contains an XML External Entities vulnerability in any table that allows 'import/export', allowing an authenticated attacker to import the template file and perform path traversal on the local system files. Users should upgrade to Agiloft Release 31.
History

Tue, 02 Sep 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Atlassian
Atlassian agiloft
CPEs cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:*
Vendors & Products Atlassian
Atlassian agiloft

Fri, 29 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 27 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Agiloft
Agiloft agiloft
Vendors & Products Agiloft
Agiloft agiloft

Tue, 26 Aug 2025 22:45:00 +0000

Type Values Removed Values Added
Description Agiloft Release 28 contains an XML External Entities vulnerability in any table that allows 'import/export', allowing an authenticated attacker to import the template file and perform path traversal on the local system files. Users should upgrade to Agiloft Release 31.
Title Agiloft XML external entity local path traversal
Weaknesses CWE-611
References
Metrics cvssV3_1

{'score': 4.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisa-cg

Published:

Updated: 2025-08-29T18:26:12.502Z

Reserved: 2025-04-15T20:56:24.416Z

Link: CVE-2025-35112

cve-icon Vulnrichment

Updated: 2025-08-29T18:26:03.208Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-26T23:15:35.033

Modified: 2025-09-02T17:59:05.770

Link: CVE-2025-35112

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-27T11:41:37Z