CVE-2025-52168
BaseFortify
Publication date: 2025-07-18
Last updated on: 2025-07-22
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| agorum_software_gmbh | agorum_core_open | 11.9.2 |
| agorum_software_gmbh | agorum_core_open | 11.9.1.3-1857 |
| agorum_software_gmbh | agorum_core_open | 11.10.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-52168 is an Absolute Path Traversal vulnerability in the dynawebservice component of agorum Software GmbH's Agorum core open ECM system. It allows unauthenticated attackers to access arbitrary files on the server by sending specially crafted HTTP GET requests to the /dynawebservices/wsfiling/ endpoint. For example, an attacker can retrieve sensitive files like /etc/passwd by exploiting this flaw, which occurs due to improper validation and sanitization of user inputs. [1]
How can this vulnerability impact me? :
This vulnerability can have a severe impact by allowing attackers to access sensitive files on the affected system without authentication. This can lead to exposure of confidential information, potential further exploitation of the system, and compromise of system integrity and confidentiality. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by sending crafted HTTP GET requests to the vulnerable endpoint and checking for unauthorized file access. For example, you can use the following curl command to test if the server is vulnerable: curl -v "http://<target>/dynawebservices/wsfiling/?action=getTemp&tmpFile=/etc/passwd". If the server responds with the contents of the /etc/passwd file or any other arbitrary file, the system is vulnerable. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Agorum core open software to fixed versions 11.9.2 or 11.10.1. Additionally, ensure proper validation and sanitization of user inputs to prevent absolute path traversal, enforce relative paths for file access, implement a whitelist to restrict file access to trusted locations, and limit file system permissions to only necessary files and directories. [1]