CVE-2025-28099: n/a
opencms V2.3 is vulnerable to Arbitrary file read in src/main/webapp/view/admin/document/dataPage.jsp,
AI Analysis
Technical Summary
CVE-2025-28099 is a medium-severity vulnerability identified in opencms version 2.3, specifically located in the file src/main/webapp/view/admin/document/dataPage.jsp. The vulnerability is classified as an arbitrary file read issue, which corresponds to CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). This type of vulnerability allows an attacker with limited privileges (PR:L) to read arbitrary files on the server without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning the attacker can exploit this remotely over the network. The vulnerability does not affect the integrity or availability of the system but impacts confidentiality by potentially exposing sensitive files. The CVSS 3.1 base score is 4.3, reflecting a medium severity level. The vulnerability arises from insufficient validation or sanitization of file path inputs in the dataPage.jsp component, which is part of the administrative interface of opencms. An attacker who can authenticate with limited privileges could exploit this flaw to read files outside the intended directory scope, potentially exposing configuration files, credentials, or other sensitive data stored on the server. No known exploits are currently reported in the wild, and no patches or vendor advisories are linked yet. The vulnerability was reserved in March 2025 and published in April 2025, indicating it is a recent discovery.
Potential Impact
For European organizations using opencms 2.3, this vulnerability poses a risk to confidentiality, particularly for those hosting sensitive or regulated data on their content management systems. Exposure of configuration files or sensitive documents could lead to further attacks, such as credential theft or information leakage, which may violate data protection regulations like GDPR. Since the vulnerability requires at least limited privileges, the risk is higher in environments where multiple users have access to the CMS backend, such as large enterprises, government agencies, or educational institutions. The lack of impact on integrity and availability reduces the risk of service disruption but does not diminish the potential for data breaches. Organizations in sectors with strict compliance requirements (finance, healthcare, public sector) could face legal and reputational consequences if sensitive data is exposed. The absence of known exploits suggests a window of opportunity for defenders to patch or mitigate before active exploitation occurs.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are running opencms version 2.3 and restrict access to the administrative interface to trusted users only. Implement strict access controls and monitor authentication logs for suspicious activity. Since no official patch is currently available, organizations should consider applying virtual patching via web application firewalls (WAFs) that can detect and block attempts to exploit path traversal or arbitrary file read patterns targeting dataPage.jsp. Conduct a thorough review of user privileges to ensure that only necessary personnel have access to the CMS backend. Additionally, implement file system permissions to limit the web server's ability to read sensitive files outside the intended directories. Regularly audit and monitor file access logs for anomalies. Once a patch or update is released, prioritize its deployment. Finally, consider isolating the CMS environment and employing network segmentation to reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-28099: n/a
Description
opencms V2.3 is vulnerable to Arbitrary file read in src/main/webapp/view/admin/document/dataPage.jsp,
AI-Powered Analysis
Technical Analysis
CVE-2025-28099 is a medium-severity vulnerability identified in opencms version 2.3, specifically located in the file src/main/webapp/view/admin/document/dataPage.jsp. The vulnerability is classified as an arbitrary file read issue, which corresponds to CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). This type of vulnerability allows an attacker with limited privileges (PR:L) to read arbitrary files on the server without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning the attacker can exploit this remotely over the network. The vulnerability does not affect the integrity or availability of the system but impacts confidentiality by potentially exposing sensitive files. The CVSS 3.1 base score is 4.3, reflecting a medium severity level. The vulnerability arises from insufficient validation or sanitization of file path inputs in the dataPage.jsp component, which is part of the administrative interface of opencms. An attacker who can authenticate with limited privileges could exploit this flaw to read files outside the intended directory scope, potentially exposing configuration files, credentials, or other sensitive data stored on the server. No known exploits are currently reported in the wild, and no patches or vendor advisories are linked yet. The vulnerability was reserved in March 2025 and published in April 2025, indicating it is a recent discovery.
Potential Impact
For European organizations using opencms 2.3, this vulnerability poses a risk to confidentiality, particularly for those hosting sensitive or regulated data on their content management systems. Exposure of configuration files or sensitive documents could lead to further attacks, such as credential theft or information leakage, which may violate data protection regulations like GDPR. Since the vulnerability requires at least limited privileges, the risk is higher in environments where multiple users have access to the CMS backend, such as large enterprises, government agencies, or educational institutions. The lack of impact on integrity and availability reduces the risk of service disruption but does not diminish the potential for data breaches. Organizations in sectors with strict compliance requirements (finance, healthcare, public sector) could face legal and reputational consequences if sensitive data is exposed. The absence of known exploits suggests a window of opportunity for defenders to patch or mitigate before active exploitation occurs.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are running opencms version 2.3 and restrict access to the administrative interface to trusted users only. Implement strict access controls and monitor authentication logs for suspicious activity. Since no official patch is currently available, organizations should consider applying virtual patching via web application firewalls (WAFs) that can detect and block attempts to exploit path traversal or arbitrary file read patterns targeting dataPage.jsp. Conduct a thorough review of user privileges to ensure that only necessary personnel have access to the CMS backend. Additionally, implement file system permissions to limit the web server's ability to read sensitive files outside the intended directories. Regularly audit and monitor file access logs for anomalies. Once a patch or update is released, prioritize its deployment. Finally, consider isolating the CMS environment and employing network segmentation to reduce the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-03-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd7068
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/12/2025, 4:34:52 AM
Last updated: 7/28/2025, 10:58:11 AM
Views: 11
Related Threats
CVE-2025-45313: n/a
UnknownCVE-2025-8921: SQL Injection in code-projects Job Diary
MediumCVE-2025-8920: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-45316: n/a
HighCVE-2025-45314: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.