CVE-2025-35113
5.9MEDIUMAgiloft Release 28 does not properly neutralize special elements used in an EUI template engine, allowing an authenticated attacker to achieve remote code execution by loading a specially crafted payl
Veröffentlicht: 8/26/2025Aktualisiert: 9/2/2025
Beschreibung
Agiloft Release 28 does not properly neutralize special elements used in an EUI template engine, allowing an authenticated attacker to achieve remote code execution by loading a specially crafted payload. Users should upgrade to Agiloft Release 31.
KI-AnalyseKI-gestützt
Betroffene Produkte
atlassianagiloft
Referenzen
- https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.jsonThird Party Advisory
- https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+ResolutionRelease NotesVendor Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-35113Third Party Advisory