CVE-2025-35113

Agiloft Release 28 does not properly neutralize special elements used in an EUI template engine, allowing an authenticated attacker to achieve remote code execution by loading a specially crafted payload. Users should upgrade to Agiloft Release 31.
Configurations

Configuration 1 (hide)

cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:*

History

02 Sep 2025, 17:58

Type Values Removed Values Added
First Time Atlassian
Atlassian agiloft
References () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json - () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json - Third Party Advisory
References () https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution - () https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution - Release Notes, Vendor Advisory
References () https://www.cve.org/CVERecord?id=CVE-2025-35113 - () https://www.cve.org/CVERecord?id=CVE-2025-35113 - Third Party Advisory
CPE cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:*

29 Aug 2025, 16:22

Type Values Removed Values Added
Summary
  • (es) Agiloft Release 28 no neutraliza correctamente los elementos especiales utilizados en un motor de plantillas EUI, lo que permite que un atacante autenticado ejecute código remoto mediante la carga de un payload especialmente manipulada. Los usuarios deben actualizar a Agiloft Release 31.

26 Aug 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-26 23:15

Updated : 2025-09-02 17:58


NVD link : CVE-2025-35113

Mitre link : CVE-2025-35113

CVE.ORG link : CVE-2025-35113


JSON object : View

Products Affected

atlassian

  • agiloft
CWE
CWE-1336

Improper Neutralization of Special Elements Used in a Template Engine