CVE-2025-49538
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-07-11
Assigner: Adobe Systems Incorporated
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2025 |
| adobe | coldfusion | 2025 |
| adobe | coldfusion | 2025 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-91 | The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an XML Injection issue in certain ColdFusion versions that allows an attacker to inject crafted XML or XPath queries. This can lead to unauthorized reading of files on the system or cause denial of service. Exploitation does not require user interaction but does require the attacker to have access to shared secrets.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an attacker to read arbitrary files on your system without authorization, potentially exposing sensitive data. It can also cause denial of service, disrupting the availability of your application or system.