Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27517 | The upload endpoint insufficiently validates the 'Upload-Key' request header. By supplying path traversal sequences, an authenticated attacker can cause the server to create upload-related artifacts outside the intended storage location. In certain configurations this enables arbitrary file write and may be leveraged to achieve remote code execution. |
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2025-085 |
|
Fri, 12 Sep 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Welotec
Welotec smartems |
|
| Vendors & Products |
Welotec
Welotec smartems |
Wed, 10 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Sep 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The upload endpoint insufficiently validates the 'Upload-Key' request header. By supplying path traversal sequences, an authenticated attacker can cause the server to create upload-related artifacts outside the intended storage location. In certain configurations this enables arbitrary file write and may be leveraged to achieve remote code execution. | |
| Title | Path Traversal via 'Upload-Key' in SmartEMS Upload Handling | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-09-10T19:27:45.979Z
Reserved: 2025-04-16T11:17:48.311Z
Link: CVE-2025-41714
Updated: 2025-09-10T19:27:42.295Z
Status : Deferred
Published: 2025-09-10T07:15:44.733
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-41714
No data.
OpenCVE Enrichment
Updated: 2025-09-12T09:11:35Z
EUVD