Agiloft Release 28 contains an XML External Entities vulnerability in any table that allows 'import/export', allowing an authenticated attacker to import the template file and perform path traversal on the local system files. Users should upgrade to Agiloft Release 31.
References
Link | Resource |
---|---|
https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json | Third Party Advisory |
https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution | Release Notes Vendor Advisory |
https://www.cve.org/CVERecord?id=CVE-2025-35112 | Third Party Advisory |
Configurations
History
02 Sep 2025, 17:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Atlassian agiloft
Atlassian |
|
References | () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json - Third Party Advisory | |
References | () https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution - Release Notes, Vendor Advisory | |
References | () https://www.cve.org/CVERecord?id=CVE-2025-35112 - Third Party Advisory | |
CPE | cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:* |
29 Aug 2025, 16:22
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Aug 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-26 23:15
Updated : 2025-09-02 17:59
NVD link : CVE-2025-35112
Mitre link : CVE-2025-35112
CVE.ORG link : CVE-2025-35112
JSON object : View
Products Affected
atlassian
- agiloft
CWE
CWE-611
Improper Restriction of XML External Entity Reference