CVE-2025-35115

Agiloft Release 28 downloads critical system packages over an insecure HTTP connection. An attacker in a Man-In-the-Middle position could replace or modify the contents of the download URL. Users should upgrade to Agiloft Release 30.
Configurations

Configuration 1 (hide)

cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:*

History

02 Sep 2025, 17:57

Type Values Removed Values Added
First Time Atlassian agiloft
Atlassian
CPE cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:*
References () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json - () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json - Third Party Advisory
References () https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution - () https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution - Release Notes, Vendor Advisory
References () https://www.cve.org/CVERecord?id=CVE-2025-35115 - () https://www.cve.org/CVERecord?id=CVE-2025-35115 - Third Party Advisory

29 Aug 2025, 16:22

Type Values Removed Values Added
Summary
  • (es) Agiloft Release 28 descarga paquetes críticos del sistema mediante una conexión HTTP insegura. Un atacante en posición de intermediario podría reemplazar o modificar el contenido de la URL de descarga. Los usuarios deben actualizar a Agiloft Release 30.

26 Aug 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-26 23:15

Updated : 2025-09-02 17:57


NVD link : CVE-2025-35115

Mitre link : CVE-2025-35115

CVE.ORG link : CVE-2025-35115


JSON object : View

Products Affected

atlassian

  • agiloft
CWE
CWE-494

Download of Code Without Integrity Check