Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27847 | Agiloft Release 28 contains an XML External Entities vulnerability in any table that allows 'import/export', allowing an authenticated attacker to import the template file and perform path traversal on the local system files. Users should upgrade to Agiloft Release 31. |
Tue, 02 Sep 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Atlassian
Atlassian agiloft |
|
| CPEs | cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Atlassian
Atlassian agiloft |
Fri, 29 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 27 Aug 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Agiloft
Agiloft agiloft |
|
| Vendors & Products |
Agiloft
Agiloft agiloft |
Tue, 26 Aug 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Agiloft Release 28 contains an XML External Entities vulnerability in any table that allows 'import/export', allowing an authenticated attacker to import the template file and perform path traversal on the local system files. Users should upgrade to Agiloft Release 31. | |
| Title | Agiloft XML external entity local path traversal | |
| Weaknesses | CWE-611 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2025-08-29T18:26:12.502Z
Reserved: 2025-04-15T20:56:24.416Z
Link: CVE-2025-35112
Updated: 2025-08-29T18:26:03.208Z
Status : Analyzed
Published: 2025-08-26T23:15:35.033
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-35112
No data.
OpenCVE Enrichment
Updated: 2025-08-27T11:41:37Z
EUVD