CVE-2025-70995

An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated attackers to achieve remote code execution due to improper validation of uploaded files. An authenticated user can upload a crafted web.config file by sending a crafted POST request to /ASDKAPI/api/v8.6/item/addfile, which is processed by the ASP.NET runtime. The uploaded configuration file alters the execution context of the upload directory, enabling compilation and execution of attacker-controlled code (e.g., generation of an .aspx webshell). This allows remote command execution on the server without user interaction beyond authentication, impacting both On-Premise and SaaS deployments. The vendor has fixed the issue in Aranda Service Desk V8 8.30.6.
Configurations

No configuration.

History

17 Mar 2026, 17:16

Type Values Removed Values Added
References
  • () https://docs.arandasoft.com/asdk-v8-release-notes/assets/asdk-v8-release-notes.pdf -
Summary
  • (es) Un problema en Aranda Service Desk Web Edition (ASDK API 8.6) permite a los atacantes autenticados ejecutar código remoto debido a una validación inadecuada de los archivos cargados. Un usuario autenticado puede cargar un archivo web. config creado enviando una solicitud POST creada a /ASDKAPI/api/v8.6/item/addfile, que es procesada por el tiempo de ejecución de ASP.NET. El archivo de configuración cargado altera el contexto de ejecución del directorio de carga, lo que permite la compilación y ejecución de código controlado por el atacante (por ejemplo, la generación de un webshell .aspx). Esto permite la ejecución remota de comandos en el servidor sin interacción del usuario más allá de la autenticación, lo que afecta tanto a las implementaciones locales como a las de SaaS.
Summary (en) An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated attackers to achieve remote code execution due to improper validation of uploaded files. An authenticated user can upload a crafted web.config file by sending a crafted POST request to /ASDKAPI/api/v8.6/item/addfile, which is processed by the ASP.NET runtime. The uploaded configuration file alters the execution context of the upload directory, enabling compilation and execution of attacker-controlled code (e.g., generation of an .aspx webshell). This allows remote command execution on the server without user interaction beyond authentication, impacting both On-Premise and SaaS deployments. (en) An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated attackers to achieve remote code execution due to improper validation of uploaded files. An authenticated user can upload a crafted web.config file by sending a crafted POST request to /ASDKAPI/api/v8.6/item/addfile, which is processed by the ASP.NET runtime. The uploaded configuration file alters the execution context of the upload directory, enabling compilation and execution of attacker-controlled code (e.g., generation of an .aspx webshell). This allows remote command execution on the server without user interaction beyond authentication, impacting both On-Premise and SaaS deployments. The vendor has fixed the issue in Aranda Service Desk V8 8.30.6.

06 Mar 2026, 11:16

Type Values Removed Values Added
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

05 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-05 21:16

Updated : 2026-04-27 19:18


NVD link : CVE-2025-70995

Mitre link : CVE-2025-70995

CVE.ORG link : CVE-2025-70995


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')