CVE-2025-70995
Received Received - Intake
Remote Code Execution via File Upload in Aranda Service Desk

Publication date: 2026-03-05

Last updated on: 2026-03-17

Assigner: MITRE

Description
An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated attackers to achieve remote code execution due to improper validation of uploaded files. An authenticated user can upload a crafted web.config file by sending a crafted POST request to /ASDKAPI/api/v8.6/item/addfile, which is processed by the ASP.NET runtime. The uploaded configuration file alters the execution context of the upload directory, enabling compilation and execution of attacker-controlled code (e.g., generation of an .aspx webshell). This allows remote command execution on the server without user interaction beyond authentication, impacting both On-Premise and SaaS deployments. The vendor has fixed the issue in Aranda Service Desk V8 8.30.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-05
Last Modified
2026-03-17
Generated
2026-05-07
AI Q&A
2026-03-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
aranda_software aranda_service_desk_web_edition 8.6
aranda_software asdk_api 8.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-70995 is a vulnerability in Aranda Service Desk Web Edition (ASDK API 8.6) that allows authenticated attackers to achieve remote code execution by uploading a specially crafted web.config file.

An authenticated user can send a crafted POST request to the endpoint /ASDKAPI/api/v8.6/item/addfile with a malicious web.config file. This file is processed by the ASP.NET runtime and modifies the execution context of the upload directory.

By altering the execution context, the attacker can enable compilation and execution of attacker-controlled code, such as generating an .aspx webshell, which allows remote command execution on the server.

This vulnerability affects both On-Premise and SaaS deployments and requires only authenticated access without further user interaction.


How can this vulnerability impact me? :

This vulnerability allows an authenticated attacker to execute arbitrary code remotely on the server hosting Aranda Service Desk Web Edition.

The attacker can upload malicious configuration files that enable execution of attacker-controlled code, such as webshells, which can be used to run commands, manipulate data, or further compromise the system.

Because the vulnerability requires only authentication and no additional user interaction, it significantly increases the risk of server compromise.

Both On-Premise and SaaS deployments are affected, meaning the impact can be widespread depending on the deployment environment.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'Detection of this vulnerability involves identifying if a crafted web.config file has been uploaded to the Aranda Service Desk Web Edition upload directory via the vulnerable API endpoint.'}, {'type': 'paragraph', 'content': 'One method is to send a GET request to the endpoint `/ASDKAPI/api/v8.6/item/-1/10/<userId>/files` which returns URLs of uploaded files. This can help discover the upload directory and check for suspicious files such as a malicious web.config or .aspx webshell files.'}, {'type': 'paragraph', 'content': 'Example commands to detect potential exploitation include:'}, {'type': 'list_item', 'content': 'Use curl or similar tools to list uploaded files for a specific user ID: `curl -X GET "https://<target>/ASDKAPI/api/v8.6/item/-1/10/<userId>/files" -H "Authorization: Bearer <token>"`'}, {'type': 'list_item', 'content': 'Inspect the upload directory on the server (if accessible) for unexpected or suspicious web.config files or .aspx files.'}, {'type': 'list_item', 'content': 'Monitor HTTP POST requests to `/ASDKAPI/api/v8.6/item/addfile` for uploads of web.config files or unusual file types.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting the types of files that can be uploaded through the `/ASDKAPI/api/v8.6/item/addfile` endpoint to prevent uploading of web.config files or other executable configuration files.

Additionally, review and harden the upload directory permissions to prevent execution of uploaded files, and disable or limit ASP.NET runtime processing of uploaded configuration files in that directory.

Monitoring and logging upload activities to detect suspicious behavior is also recommended.

If possible, apply any vendor patches or updates addressing this vulnerability from Aranda Software.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart