Vulnerability Description
Agiloft Release 28 does not properly neutralize special elements used in an EUI template engine, allowing an authenticated attacker to achieve remote code execution by loading a specially crafted payload. Users should upgrade to Agiloft Release 31.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Agiloft | >= 19, < 31 |
Related Weaknesses (CWE)
References
- https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/Third Party Advisory
- https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+ResolutionRelease NotesVendor Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-35113Third Party Advisory
FAQ
What is CVE-2025-35113?
CVE-2025-35113 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Agiloft Release 28 does not properly neutralize special elements used in an EUI template engine, allowing an authenticated attacker to achieve remote code execution by loading a specially crafted payl...
How severe is CVE-2025-35113?
CVE-2025-35113 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-35113?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Agiloft.