Agiloft Release 28 contains an XML External Entities vulnerability in any table that allows 'import/export', allowing an authenticated attacker to import the template file and perform path traversal on the local system files. Users should upgrade to Agiloft Release 31.
History

Wed, 27 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Agiloft
Agiloft agiloft
Vendors & Products Agiloft
Agiloft agiloft

Tue, 26 Aug 2025 22:45:00 +0000

Type Values Removed Values Added
Description Agiloft Release 28 contains an XML External Entities vulnerability in any table that allows 'import/export', allowing an authenticated attacker to import the template file and perform path traversal on the local system files. Users should upgrade to Agiloft Release 31.
Title Agiloft XML external entity local path traversal
Weaknesses CWE-611
References
Metrics cvssV3_1

{'score': 4.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisa-cg

Published:

Updated: 2025-08-26T22:19:20.235Z

Reserved: 2025-04-15T20:56:24.416Z

Link: CVE-2025-35112

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-08-26T23:15:35.033

Modified: 2025-08-26T23:15:35.033

Link: CVE-2025-35112

cve-icon Redhat

No data.