CVE-2025-59711
Directory Traversal in Biztalk360 Upload Allows Unauthorized File Write
Publication date: 2026-04-03
Last updated on: 2026-04-09
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| kovai | biztalk360 | to 11.6.3963.2611 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Biztalk360 versions before 11.5. It arises due to improper handling of user-provided input in an upload mechanism. An authenticated attacker can exploit this flaw to write files outside the intended destination directory or force an authentication from the service. This type of vulnerability is known as Directory Traversal.
How can this vulnerability impact me? :
The vulnerability allows an authenticated attacker to write files outside the designated directory, which can lead to unauthorized file creation or modification on the server. Additionally, the attacker may coerce authentication from the service, potentially escalating privileges or bypassing security controls.