CVE-2025-15577
Arbitrary File Read in Valmet DNA Web Tools via URL Manipulation
Publication date: 2026-02-12
Last updated on: 2026-02-23
Assigner: National Cyber Security Centre Finland
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| valmet | dna | to 2022 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-15577 is a vulnerability in the Valmet DNA Engineering Web Tools (version C2022 and older) that allows an unauthenticated attacker to achieve arbitrary file read access by manipulating the URL on the Valmet DNA web server.
This means that an attacker who can access the web server can read files on the system without needing to log in or have any privileges.
How can this vulnerability impact me? :
This vulnerability can have a high impact because it allows attackers to read arbitrary files on the server without authentication.
Such unauthorized file access could expose sensitive information, configuration files, or other critical data, potentially leading to further attacks or data breaches.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking if the Valmet DNA Engineering Web Tools (version C2022 and older) web server is accessible and vulnerable to arbitrary file read via URL manipulation.'}, {'type': 'paragraph', 'content': 'Since the vulnerability involves manipulating URLs to read arbitrary files without authentication, detection can involve sending crafted HTTP requests to the web server to see if unauthorized file access is possible.'}, {'type': 'paragraph', 'content': 'No specific commands are provided in the available resources, but network administrators can use tools like curl or wget to test URL endpoints for unauthorized file access attempts.'}, {'type': 'list_item', 'content': 'Example command to test URL manipulation (replace <target_url> and <file_path>):'}, {'type': 'list_item', 'content': 'curl "http://<target_url>/<file_path>" -v'}, {'type': 'list_item', 'content': 'Monitor web server logs for unusual URL requests that attempt to access sensitive files.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include properly configuring firewalls to prevent unauthorized access to the Valmet DNA Web Tools web server from untrusted networks.
Restrict network access so that only trusted users or systems can reach the vulnerable web server.
Contact Valmet Automation Customer Service to obtain and apply the available solution or patch for this vulnerability.