Description
Local File Inclusion in Contact Plan, E-Mail, SMS and Fax components in Asseco SEE Live 2.0 allows remote authenticated users to access files on the host via "path" parameter in the downloadAttachment and downloadAttachmentFromPath API calls.
Published: 2026-03-12
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the Contact Plan, E‑Mail, SMS and Fax modules of Asseco SEE Live 2.0 allows an authenticated user to read arbitrary host files by manipulating the \"path\" parameter in the downloadAttachment and downloadAttachmentFromPath API calls. This local file inclusion vulnerability exposes confidential data such as configuration files, system logs, or credentials, representing an improper file access control weakness (CWE-552). The impact is limited to confidentiality; no integrity or availability effects are described in the CVE write‑up.

Affected Systems

The vulnerability affects Asseco SEE Live 2.0, specifically its Contact Plan, E‑Mail, SMS, and Fax components. Any installation of this version that has the downloadAttachment or downloadAttachmentFromPath APIs enabled is susceptible. No further version granularity is provided beyond the 2.0 release in the CVE description.

Risk and Exploitability

The baseline CVSS score of 6.5 denotes moderate severity, and the EPSS score of less than 1 % indicates that widespread exploitation is unlikely at this time. The vulnerability is not listed in CISA’s KEV catalog. To exploit the flaw a user simply needs a valid authenticated session with the API; from there the attacker can supply a crafted path payload to read any file accessible to the application process. Because the flaw bypasses normal file‑access checks, it can expose sensitive data if the user account has sufficient system privileges.

Generated by OpenCVE AI on May 12, 2026 at 04:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑supplied patch or upgrade to a patched version that corrects the path validation in the downloadAttachment API.
  • Restrict access to the downloadAttachment and downloadAttachmentFromPath endpoints by implementing firewall, reverse‑proxy, or API‑gateway rules that limit the calls to trusted accounts or IP ranges.
  • Review user permissions to ensure only privileged or trusted accounts can invoke the vulnerable download endpoints; remove or downgrade permissions for accounts that do not require file download capability.
  • If the downloadAttachment functionality is not required for your deployment, disable or delete the corresponding API calls to eliminate the attack surface.
  • Monitor API logs for suspicious path traversal attempts and investigate anomalies promptly.

Generated by OpenCVE AI on May 12, 2026 at 04:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 04:45:00 +0000

Type Values Removed Values Added
Title Local File Inclusion via downloadAttachment Path Parameter in Asseco SEE Live 2.0

Tue, 12 May 2026 03:15:00 +0000

Type Values Removed Values Added
Title Local File Inclusion in API Download Endpoints Allows Remote Authenticated Users to Read Host Files
Weaknesses CWE-200
CWE-22

Tue, 12 May 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-552

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title Local File Inclusion in API Download Endpoints Allows Remote Authenticated Users to Read Host Files
Weaknesses CWE-200
CWE-22

Fri, 27 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
Title LFI in Asseco SEE Live 2.0 Exposes Arbitrary Files to Authenticated Users
Weaknesses CWE-20
CWE-22

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
Title LFI in Asseco SEE Live 2.0 Exposes Arbitrary Files to Authenticated Users
Weaknesses CWE-20
CWE-22

Thu, 26 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Title Authenticated File Disclosure via API Path Parameter
Weaknesses CWE-22

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Authenticated File Disclosure via API Path Parameter
Weaknesses CWE-22

Wed, 25 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Title Local File Inclusion in Asseco SEE Live 2.0 Allows Remote Authenticated Users to Read Arbitrary Files
Weaknesses CWE-200
CWE-22

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Title Local File Inclusion in Asseco SEE Live 2.0 Allows Remote Authenticated Users to Read Arbitrary Files
Weaknesses CWE-200
CWE-22

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Title Remote Authenticated File Disclosure via Path Parameter in Asseco SEE Live 2.0
Weaknesses CWE-22

Mon, 23 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Title Remote Authenticated File Disclosure via Path Parameter in Asseco SEE Live 2.0
Weaknesses CWE-22

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
Title Local File Inclusion in Asseco SEE Live 2.0 Allows Authenticated Users to Read Arbitrary Host Files
Weaknesses CWE-200
CWE-22

Fri, 20 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Title Local File Inclusion in Asseco SEE Live 2.0 Allows Authenticated Users to Read Arbitrary Host Files
Weaknesses CWE-200
CWE-22

Sat, 14 Mar 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
References

Fri, 13 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
References

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Asseco
Asseco see Live
Vendors & Products Asseco
Asseco see Live

Thu, 12 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description Local File Inclusion in Contact Plan, E-Mail, SMS and Fax components in Asseco SEE Live 2.0 allows remote authenticated users to access files on the host via "path" parameter in the downloadAttachment and downloadAttachmentFromPath API calls.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-12T00:05:49.349Z

Reserved: 2025-12-08T00:00:00.000Z

Link: CVE-2025-66955

cve-icon Vulnrichment

Updated: 2026-03-14T03:32:28.009Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-12T19:16:15.077

Modified: 2026-05-12T01:16:45.750

Link: CVE-2025-66955

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T04:30:07Z

Weaknesses