Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11371: Vulnerability in Gladinet CentreStack and TrioFox

0
Medium
VulnerabilityCVE-2025-11371cvecve-2025-11371
Published: Thu Oct 09 2025 (10/09/2025, 16:50:49 UTC)
Source: CVE Database V5
Vendor/Project: Gladinet
Product: CentreStack and TrioFox

Description

In the default installation and configuration of Gladinet CentreStack and TrioFox, there is an unauthenticated Local File Inclusion Flaw that allows unintended disclosure of system files. Exploitation of this vulnerability has been observed in the wild.  This issue impacts Gladinet CentreStack and Triofox: All versions prior to and including 16.7.10368.56560

AI-Powered Analysis

AILast updated: 10/09/2025, 17:23:07 UTC

Technical Analysis

CVE-2025-11371 is a Local File Inclusion (LFI) vulnerability found in Gladinet CentreStack and TrioFox, two file sharing and collaboration platforms widely used in enterprise environments. The vulnerability exists in the default installation and configuration of these products, allowing unauthenticated attackers to exploit the flaw to read arbitrary system files. This occurs because the applications improperly handle file path inputs, enabling attackers to traverse directories and include files outside the intended scope. The flaw affects all versions up to and including 16.7.10368.56560. Although no CVSS score has been assigned, the vulnerability is critical due to the lack of authentication required and the potential to disclose sensitive system files such as configuration files, credentials, or logs. Exploitation in the wild has been observed, confirming active attempts to leverage this vulnerability for information gathering or further attacks. The absence of patches at the time of publication increases the urgency for organizations to implement interim mitigations. The vulnerability's exploitation could serve as a foothold for attackers to escalate privileges or move laterally within networks. Given the nature of CentreStack and TrioFox as collaboration tools, the exposure of sensitive files could lead to significant confidentiality breaches and operational disruptions.

Potential Impact

For European organizations, the impact of CVE-2025-11371 can be substantial. The unauthorized disclosure of system files can lead to leakage of sensitive corporate data, including credentials, configuration details, and intellectual property. This exposure increases the risk of subsequent attacks such as privilege escalation, ransomware deployment, or espionage. Organizations relying on Gladinet CentreStack and TrioFox for secure file sharing and collaboration may face operational disruptions and reputational damage if attackers exploit this vulnerability. The breach of confidentiality could also lead to violations of GDPR and other data protection regulations, resulting in legal and financial penalties. Additionally, critical infrastructure and government agencies using these products could be targeted for espionage or sabotage. The ease of exploitation without authentication means that attackers can operate remotely and anonymously, increasing the threat landscape. Overall, the vulnerability undermines trust in file sharing platforms and necessitates urgent remediation to protect European digital assets.

Mitigation Recommendations

1. Immediately audit all instances of Gladinet CentreStack and TrioFox to identify affected versions and configurations. 2. Restrict network access to these services using firewalls and network segmentation to limit exposure to trusted users only. 3. Implement strict access controls and monitor logs for unusual file access patterns indicative of exploitation attempts. 4. Disable or restrict features that allow file path manipulation if configurable. 5. Apply vendor patches promptly once released; engage with Gladinet support for timelines and interim fixes. 6. Use Web Application Firewalls (WAFs) with custom rules to detect and block LFI attack patterns targeting these products. 7. Conduct regular vulnerability scanning and penetration testing focused on file inclusion and path traversal issues. 8. Educate IT and security teams about this vulnerability to ensure rapid detection and response. 9. Consider alternative secure file sharing solutions if patching is delayed or not feasible. 10. Maintain backups and incident response plans to mitigate potential data loss or compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Huntress
Date Reserved
2025-10-06T14:00:55.234Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68e7ebf3ba0e608b4fa3cf85

Added to database: 10/9/2025, 5:08:03 PM

Last enriched: 10/9/2025, 5:23:07 PM

Last updated: 10/10/2025, 4:12:18 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats