CVE-2025-35114

Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30.
Configurations

Configuration 1 (hide)

cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:*

History

02 Sep 2025, 17:58

Type Values Removed Values Added
First Time Atlassian agiloft
Atlassian
CPE cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:*
References () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json - () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json - Third Party Advisory
References () https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution - () https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution - Release Notes, Vendor Advisory
References () https://www.cve.org/CVERecord?id=CVE-2025-35114 - () https://www.cve.org/CVERecord?id=CVE-2025-35114 - Third Party Advisory

29 Aug 2025, 16:22

Type Values Removed Values Added
Summary
  • (es) Agiloft Release 28 contiene varias cuentas con credenciales predeterminadas que podrían permitir la escalada de privilegios local. Se conoce el hash de la contraseña de al menos una de las cuentas y las credenciales podrían descifrarse sin conexión. Los usuarios deben actualizar a Agiloft Release 30.

26 Aug 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-26 23:15

Updated : 2025-09-02 17:58


NVD link : CVE-2025-35114

Mitre link : CVE-2025-35114

CVE.ORG link : CVE-2025-35114


JSON object : View

Products Affected

atlassian

  • agiloft
CWE
CWE-1392

Use of Default Credentials