Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35053: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Newforma Project Center

0
Medium
VulnerabilityCVE-2025-35053cvecve-2025-35053cwe-22cwe-73
Published: Thu Oct 09 2025 (10/09/2025, 20:20:18 UTC)
Source: CVE Database V5
Vendor/Project: Newforma
Product: Project Center

Description

Newforma Info Exchange (NIX) accepts requests to '/UserWeb/Common/MarkupServices.ashx' specifying the 'DownloadExportedPDF' command that allow an authenticated user to read and delete arbitrary files with 'NT AUTHORITY\NetworkService' privileges. In Newforma before 2023.1, anonymous access is enabled by default (CVE-2025-35062), allowing an otherwise unauthenticated attacker to effectively authenticate as 'anonymous' and exploit this file upload vulnerability.

AI-Powered Analysis

AILast updated: 10/09/2025, 20:55:22 UTC

Technical Analysis

CVE-2025-35053 is a path traversal vulnerability identified in Newforma Project Center, a project information management software widely used in construction and engineering industries. The flaw resides in the endpoint '/UserWeb/Common/MarkupServices.ashx' when processing the 'DownloadExportedPDF' command. Authenticated users can exploit this vulnerability to read and delete arbitrary files on the server with the privileges of the 'NT AUTHORITY\NetworkService' account, which is a highly privileged local service account on Windows systems. This can lead to unauthorized disclosure of sensitive files and potential disruption of service by deleting critical files. Furthermore, versions of Newforma prior to 2023.1 have anonymous access enabled by default (CVE-2025-35062), which allows unauthenticated attackers to gain anonymous access and exploit this vulnerability without credentials. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-73 (External Control of File Name or Path). The CVSS v3.1 base score is 6.4, indicating medium severity, with an attack vector over the network, low attack complexity, privileges required (authenticated user or anonymous if default settings are unchanged), no user interaction, and a scope change due to the ability to affect resources beyond the vulnerable component. No public exploits have been reported yet, but the potential for sensitive data exposure and service disruption is significant. The vulnerability affects all versions up to and including 2024.3, with no patch links currently available, emphasizing the need for immediate mitigation and monitoring.

Potential Impact

For European organizations, especially those in construction, engineering, and project management sectors that rely on Newforma Project Center, this vulnerability poses a risk of unauthorized file access and deletion. The exposure of sensitive project documentation, contracts, and proprietary data could lead to confidentiality breaches, regulatory non-compliance (e.g., GDPR), and reputational damage. Deletion of critical files could disrupt project workflows and cause operational downtime. The fact that the vulnerability can be exploited remotely over the network with low complexity and no user interaction increases the risk of automated or targeted attacks. Organizations that have not disabled anonymous access are particularly vulnerable to unauthenticated exploitation, expanding the attack surface. The impact on availability and confidentiality could affect large-scale infrastructure projects and government contracts, which are prevalent in countries with advanced construction sectors. Additionally, the use of the 'NT AUTHORITY\NetworkService' account privileges means attackers could potentially escalate their access or move laterally within the network, increasing the threat to overall enterprise security.

Mitigation Recommendations

1. Immediately disable anonymous access in Newforma Project Center if running versions prior to 2023.1 to prevent unauthenticated exploitation. 2. Restrict access to the '/UserWeb/Common/MarkupServices.ashx' endpoint using network segmentation, firewalls, or web application firewalls (WAF) to limit exposure. 3. Implement strict file system permissions to ensure that the 'NetworkService' account has minimal necessary privileges and cannot access or delete sensitive files outside designated directories. 4. Monitor logs for unusual file access or deletion activities, especially requests to the vulnerable endpoint and commands like 'DownloadExportedPDF'. 5. Apply principle of least privilege to all service accounts and review service account permissions regularly. 6. Engage with Newforma support or vendor channels to obtain patches or updates as soon as they become available. 7. Conduct internal penetration testing and vulnerability scanning focused on path traversal and file access vulnerabilities. 8. Educate administrators and users about the risks of default configurations and the importance of secure deployment practices. 9. Consider deploying endpoint detection and response (EDR) solutions to detect suspicious activities related to file manipulation. 10. Maintain an incident response plan tailored to potential data breaches or service disruptions stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:56:24.406Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e81d26ba0e608b4fac942b

Added to database: 10/9/2025, 8:37:58 PM

Last enriched: 10/9/2025, 8:55:22 PM

Last updated: 10/11/2025, 9:23:15 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats