Agiloft Release 28 does not properly neutralize special elements used in an EUI template engine, allowing an authenticated attacker to achieve remote code execution by loading a specially crafted payload. Users should upgrade to Agiloft Release 31.
References
| Link | Resource |
|---|---|
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json | Third Party Advisory |
| https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution | Release Notes Vendor Advisory |
| https://www.cve.org/CVERecord?id=CVE-2025-35113 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-08-26 23:15
Updated : 2025-09-02 17:58
NVD link : CVE-2025-35113
Mitre link : CVE-2025-35113
CVE.ORG link : CVE-2025-35113
JSON object : View
Products Affected
atlassian
- agiloft
CWE
CWE-1336
Improper Neutralization of Special Elements Used in a Template Engine
