Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25652: n/a

0
High
VulnerabilityCVE-2025-25652cvecve-2025-25652
Published: Tue Jan 13 2026 (01/13/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-25652 is a high-severity directory traversal vulnerability affecting Eptura Archibus 2024. 03. 01. 109, specifically in the "Run script" and "Server File" components of the Database Update Wizard. This vulnerability allows unauthenticated remote attackers to read arbitrary files on the server by manipulating file path inputs. The vulnerability has a CVSS score of 7. 5, indicating a significant confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild. European organizations using this version of Eptura Archibus, especially those in facility and real estate management sectors, are at risk. Mitigation requires applying patches once available or implementing strict input validation and access controls to prevent exploitation.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:37:54 UTC

Technical Analysis

CVE-2025-25652 is a directory traversal vulnerability identified in Eptura Archibus version 2024.03.01.109, specifically within the "Run script" and "Server File" components of the Database Update Wizard. Directory traversal (CWE-22) vulnerabilities occur when an application fails to properly sanitize user-supplied file path inputs, allowing attackers to navigate outside the intended directory structure and access arbitrary files on the server. In this case, the vulnerability can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on confidentiality, enabling attackers to read sensitive files that may contain configuration data, credentials, or other critical information. The vulnerability does not affect integrity or availability, meaning attackers cannot modify files or disrupt service directly through this flaw. Although no public exploits have been reported yet, the ease of exploitation and the high confidentiality impact make this a serious threat. The affected software, Eptura Archibus, is widely used in facility and real estate management for database updates and automation tasks, making the vulnerability relevant to organizations relying on this platform for critical operations.

Potential Impact

For European organizations, the primary impact of CVE-2025-25652 is unauthorized disclosure of sensitive information stored on servers running the vulnerable Archibus version. This could include configuration files, user credentials, or proprietary data, potentially leading to further compromise or data breaches. Facility management and real estate companies, as well as public sector entities using Archibus for infrastructure management, could face operational risks and reputational damage. The vulnerability's remote and unauthenticated nature increases the risk of widespread exploitation, especially if attackers develop public exploits. Confidentiality breaches could also lead to regulatory consequences under GDPR if personal or sensitive data is exposed. Since integrity and availability are not directly impacted, the threat is less likely to cause immediate operational disruption but remains critical due to data exposure risks.

Mitigation Recommendations

Currently, no official patches are listed, so organizations should monitor vendor advisories closely for updates. In the interim, implement strict input validation and sanitization on all user-supplied file path parameters within the Database Update Wizard components to block directory traversal sequences (e.g., ../). Restrict file system permissions to limit the application’s access to only necessary directories and files, minimizing the potential exposure surface. Employ network-level controls such as web application firewalls (WAFs) with custom rules to detect and block directory traversal attempts. Conduct thorough audits of server file permissions and logs to identify any suspicious access patterns. Additionally, isolate the Archibus server within a segmented network zone to reduce exposure to external threats. Educate system administrators on the risks and ensure rapid incident response capabilities are in place to address any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-02-07T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69667940a60475309f8fa681

Added to database: 1/13/2026, 4:56:32 PM

Last enriched: 1/21/2026, 2:37:54 AM

Last updated: 2/5/2026, 5:03:53 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats