Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 13 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:eptura:archibus:2024.03.01.109:*:*:*:*:*:*:* |
Wed, 14 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eptura
Eptura archibus |
|
| Vendors & Products |
Eptura
Eptura archibus |
Tue, 13 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Eptura Archibus 2024.03.01.109, the "Run script" and "Server File" components of the "Database Update Wizard" are vulnerable to directory traversal. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-14T14:40:37.786Z
Reserved: 2025-02-07T00:00:00.000Z
Link: CVE-2025-25652
Updated: 2026-01-14T14:40:33.212Z
Status : Analyzed
Published: 2026-01-13T17:15:57.070
Modified: 2026-02-13T21:03:16.547
Link: CVE-2025-25652
No data.
OpenCVE Enrichment
Updated: 2026-01-14T11:09:12Z