Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35055: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Newforma Project Center

0
High
VulnerabilityCVE-2025-35055cvecve-2025-35055cwe-22cwe-434
Published: Thu Oct 09 2025 (10/09/2025, 20:20:56 UTC)
Source: CVE Database V5
Vendor/Project: Newforma
Product: Project Center

Description

CVE-2025-35055 is a high-severity path traversal and arbitrary file upload vulnerability in Newforma Project Center's Info Exchange component. Authenticated attackers can upload malicious files, including web shells, to any location writable by the application, enabling remote code execution and directory deletion. Additionally, versions prior to 2023. 1 enable anonymous access by default (CVE-2025-35062), allowing unauthenticated attackers to exploit this vulnerability. The CVSS score is 8. 8, reflecting high impact on confidentiality, integrity, and availability with low attack complexity and no user interaction required. No known exploits are currently reported in the wild. European organizations using Newforma Project Center should urgently assess exposure and apply mitigations to prevent potential compromise.

AI-Powered Analysis

AILast updated: 10/17/2025, 05:18:27 UTC

Technical Analysis

CVE-2025-35055 is a critical vulnerability affecting Newforma Project Center's Info Exchange (NIX) component, specifically the '/UserWeb/Common/UploadBlueimp.ashx' endpoint. This endpoint improperly restricts pathname inputs, allowing an authenticated attacker to perform path traversal attacks and upload arbitrary files to any location writable by the NIX application. Such uploaded files can include web shells or other executable content that the web server can run, leading to remote code execution (RCE). The attacker can also delete directories, severely impacting system availability and data integrity. Compounding the risk, versions of Newforma prior to 2023.1 have anonymous access enabled by default (CVE-2025-35062), effectively allowing unauthenticated attackers to gain 'anonymous' authentication and exploit the file upload vulnerability without credentials. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-434 (Unrestricted Upload of File with Dangerous Type). The CVSS v3.1 base score is 8.8, indicating a high severity with network attack vector, low attack complexity, privileges required (authenticated or anonymous in some versions), no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the potential for severe damage through remote code execution and data destruction is significant. The lack of available patches at the time of publication necessitates immediate risk mitigation and monitoring by affected organizations.

Potential Impact

For European organizations using Newforma Project Center, this vulnerability poses a significant risk of unauthorized remote code execution, data deletion, and potential full system compromise. The ability to upload and execute arbitrary files can lead to theft of sensitive project data, disruption of critical workflows, and potential lateral movement within corporate networks. Given the construction and engineering sectors' reliance on Newforma products for project management, any compromise could delay projects, cause financial losses, and damage reputations. The default anonymous access in older versions increases the attack surface by allowing unauthenticated exploitation, which is particularly concerning for organizations with externally accessible NIX instances. The impact extends beyond confidentiality and integrity to availability, as attackers can delete directories, potentially causing service outages. Regulatory compliance risks also arise if personal or sensitive data is exposed or destroyed, especially under GDPR requirements. Overall, the vulnerability threatens operational continuity and data security in European firms using this software.

Mitigation Recommendations

European organizations should immediately audit their Newforma Project Center deployments to identify affected versions, especially those prior to 2023.1. If upgrading to a patched version is not yet possible, organizations should disable or restrict access to the '/UserWeb/Common/UploadBlueimp.ashx' endpoint via web application firewalls or network segmentation. Enforce strict authentication and authorization controls to prevent anonymous access, particularly disabling the default anonymous access setting in older versions. Implement monitoring and alerting for unusual file uploads or web shell indicators on the NIX server. Conduct thorough file system permission reviews to limit writable directories accessible by the application, minimizing the impact of any successful upload. Employ intrusion detection systems to detect exploitation attempts and maintain regular backups to recover from potential data deletion. Coordinate with Newforma for timely patch releases and apply them as soon as available. Additionally, perform penetration testing focused on file upload and path traversal vectors to validate the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:56:24.406Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e81d26ba0e608b4fac9434

Added to database: 10/9/2025, 8:37:58 PM

Last enriched: 10/17/2025, 5:18:27 AM

Last updated: 11/28/2025, 6:47:42 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats