Impact
A path traversal flaw in the Altium Enterprise Server Viewer StorageController allows a regular authenticated user to specify a URL‑encoded absolute file path during a Viewer storage API request. The server discards the configured storage root and reads the requested file, exposing sensitive data such as database credentials, signing keys, certificate passwords, and OAuth secrets. This misuse of input handling corresponds to the CWE‑200 (Information Exposure) and CWE‑22 (Path Traversal) weaknesses, directly leading to disclosure of all server secrets and potential full compromise of the server and its data.
Affected Systems
On‑premise installations of Altium Enterprise Server that configure local filesystem storage are affected. Cloud deployments, which employ object storage and do not activate the StorageController component, are not impacted.
Risk and Exploitability
The vulnerability scores a CVSS of 9.4, indicating critical severity. No EPSS score is available, and it is not listed in CISA KEV; nevertheless the flaw permits a well‑qualified authenticated user to read arbitrary files from the server filesystem once the API call is made. The attack surface is limited to users with legitimate access to the Viewer API, but the consequence—full disclosure of secrets—renders this an extremely high‑risk vulnerability.
OpenCVE Enrichment