Vulnerability Description
Agiloft Release 28 downloads critical system packages over an insecure HTTP connection. An attacker in a Man-In-the-Middle position could replace or modify the contents of the download URL. Users should upgrade to Agiloft Release 30.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Agiloft | >= 19, < 30 |
Related Weaknesses (CWE)
References
- https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/Third Party Advisory
- https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+ResolutionRelease NotesVendor Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-35115Third Party Advisory
FAQ
What is CVE-2025-35115?
CVE-2025-35115 is a vulnerability with a CVSS score of 8.1 (HIGH). Agiloft Release 28 downloads critical system packages over an insecure HTTP connection. An attacker in a Man-In-the-Middle position could replace or modify the contents of the download URL. Users shou...
How severe is CVE-2025-35115?
CVE-2025-35115 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-35115?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Agiloft.