CVE-2025-35115
BaseFortify
Publication date: 2025-08-26
Last updated on: 2025-09-02
Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| atlassian | agiloft | From 19 (inc) to 30 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-494 | The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Agiloft Release 28 involves downloading critical system packages over an insecure HTTP connection. An attacker positioned as a Man-In-The-Middle could intercept and modify or replace the contents of the download URL, potentially compromising the integrity of the system packages.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to alter critical system packages during download, which may lead to system compromise, unauthorized code execution, or other malicious activities, severely impacting system security and reliability.
What immediate steps should I take to mitigate this vulnerability?
Users should upgrade to Agiloft Release 30 to mitigate this vulnerability.