CVE-2025-52168
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-18

Last updated on: 2025-07-22

Assigner: MITRE

Description
Incorrect access control in the dynawebservice component of agorum Software GmbH Agorum core open v11.9.2 & v11.10.1 allows unauthenticated attackers to access arbitrary files on the system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-18
Last Modified
2025-07-22
Generated
2026-05-07
AI Q&A
2025-07-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
agorum_software_gmbh agorum_core_open 11.9.2
agorum_software_gmbh agorum_core_open 11.9.1.3-1857
agorum_software_gmbh agorum_core_open 11.10.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-52168 is an Absolute Path Traversal vulnerability in the dynawebservice component of agorum Software GmbH's Agorum core open ECM system. It allows unauthenticated attackers to access arbitrary files on the server by sending specially crafted HTTP GET requests to the /dynawebservices/wsfiling/ endpoint. For example, an attacker can retrieve sensitive files like /etc/passwd by exploiting this flaw, which occurs due to improper validation and sanitization of user inputs. [1]


How can this vulnerability impact me? :

This vulnerability can have a severe impact by allowing attackers to access sensitive files on the affected system without authentication. This can lead to exposure of confidential information, potential further exploitation of the system, and compromise of system integrity and confidentiality. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending crafted HTTP GET requests to the vulnerable endpoint and checking for unauthorized file access. For example, you can use the following curl command to test if the server is vulnerable: curl -v "http://<target>/dynawebservices/wsfiling/?action=getTemp&tmpFile=/etc/passwd". If the server responds with the contents of the /etc/passwd file or any other arbitrary file, the system is vulnerable. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Agorum core open software to fixed versions 11.9.2 or 11.10.1. Additionally, ensure proper validation and sanitization of user inputs to prevent absolute path traversal, enforce relative paths for file access, implement a whitelist to restrict file access to trusted locations, and limit file system permissions to only necessary files and directories. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart