The upload endpoint insufficiently validates the 'Upload-Key' request header. By supplying path traversal sequences, an authenticated attacker can cause the server to create upload-related artifacts outside the intended storage location. In certain configurations this enables arbitrary file write and may be leveraged to achieve remote code execution.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://certvde.com/de/advisories/VDE-2025-085 |
![]() ![]() |
History
Wed, 10 Sep 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The upload endpoint insufficiently validates the 'Upload-Key' request header. By supplying path traversal sequences, an authenticated attacker can cause the server to create upload-related artifacts outside the intended storage location. In certain configurations this enables arbitrary file write and may be leveraged to achieve remote code execution. | |
Title | Path Traversal via 'Upload-Key' in SmartEMS Upload Handling | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-09-10T06:48:10.130Z
Reserved: 2025-04-16T11:17:48.311Z
Link: CVE-2025-41714

No data.

Status : Received
Published: 2025-09-10T07:15:44.733
Modified: 2025-09-10T07:15:44.733
Link: CVE-2025-41714

No data.

No data.