Rapid7 Appspider Pro versions below 7.5.021, suffer from a broken access control vulnerability in the application's configuration file loading mechanism, whereby an attacker can place files in directories belonging to other users or projects. Affected versions allow standard users to add custom configuration files. These files, which are loaded in alphabetical order, can override or change the settings of the original configuration files, creating a security vulnerability. This issue stems from improper directory access management.
This vulnerability was remediated in version 7.5.021 of the product.
References
| Link | Resource |
|---|---|
| https://docs.rapid7.com/insight/releasenotes-2025sep/#application-security-insightappsec-and-appspider | Vendor Advisory |
Configurations
History
11 Dec 2025, 18:20
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Rapid7 appspider Pro
Rapid7 |
|
| References | () https://docs.rapid7.com/insight/releasenotes-2025sep/#application-security-insightappsec-and-appspider - Vendor Advisory | |
| CPE | cpe:2.3:a:rapid7:appspider_pro:*:*:*:*:*:*:*:* |
25 Sep 2025, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-25 15:16
Updated : 2025-12-11 18:20
NVD link : CVE-2025-36857
Mitre link : CVE-2025-36857
CVE.ORG link : CVE-2025-36857
JSON object : View
Products Affected
rapid7
- appspider_pro
CWE
CWE-276
Incorrect Default Permissions
