Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35056: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Newforma Project Center

0
Medium
VulnerabilityCVE-2025-35056cvecve-2025-35056cwe-22
Published: Thu Oct 09 2025 (10/09/2025, 20:21:10 UTC)
Source: CVE Database V5
Vendor/Project: Newforma
Product: Project Center

Description

Newforma Info Exchange (NIX) '/UserWeb/Common/MarkupServices.ashx' 'StreamStampImage' accepts an encrypted file path and returns an image of the specified file. An authenticated attacker can read arbitrary files subject to the privileges of NIX, typically 'NT AUTHORITY\NetworkService', and the ability of StreamStampImage to process the file. The encrypted file path can be generated using the shared, hard-coded secret key described in CVE-2025-35052. This vulnerability cannot be exploited as an 'anonymous' user as described in CVE-2025-35062.

AI-Powered Analysis

AILast updated: 10/09/2025, 20:54:55 UTC

Technical Analysis

CVE-2025-35056 is a path traversal vulnerability (CWE-22) affecting Newforma Project Center's Info Exchange (NIX) component, specifically the '/UserWeb/Common/MarkupServices.ashx' endpoint's 'StreamStampImage' function. This function accepts an encrypted file path parameter and returns an image of the specified file. Due to improper validation of the pathname, an authenticated attacker can manipulate the encrypted file path to access arbitrary files on the server. The encryption relies on a shared, hard-coded secret key, previously documented in CVE-2025-35052, allowing attackers who know this key to generate valid encrypted paths. The vulnerability is constrained by the privileges of the NIX service, typically running as 'NT AUTHORITY\NetworkService', limiting the scope of accessible files to those readable by this account. Exploitation does not require user interaction but does require authentication, and anonymous users cannot exploit this issue as clarified in CVE-2025-35062. The vulnerability impacts confidentiality by potentially exposing sensitive files but does not affect integrity or availability. No patches have been linked yet, and no known exploits are reported in the wild. The CVSS v3.1 score is 5.0 (medium), reflecting the moderate risk posed by this vulnerability given the authentication requirement and limited privilege context.

Potential Impact

For European organizations using Newforma Project Center, this vulnerability poses a risk of unauthorized disclosure of sensitive project files, internal documents, or configuration data accessible to the NetworkService account. Such data leakage could lead to exposure of intellectual property, client information, or internal operational details, potentially violating GDPR requirements concerning data confidentiality and protection. The impact is particularly significant for architecture, engineering, and construction firms that rely on Newforma for project collaboration and document management. While the vulnerability does not allow modification or disruption of services, the confidentiality breach could damage reputation and lead to regulatory penalties. The requirement for authentication reduces the risk from external attackers but insider threats or compromised credentials could enable exploitation. Given the shared secret key is hard-coded, attackers with access to this key can automate attacks, increasing the threat level. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks.

Mitigation Recommendations

European organizations should immediately audit their use of Newforma Project Center and restrict access to the Info Exchange component to trusted users only. Since no official patch is linked, organizations should monitor Newforma's advisories for updates or patches addressing CVE-2025-35056 and CVE-2025-35052. In the interim, consider implementing network-level controls such as IP whitelisting or VPN access to limit exposure. Review and rotate any shared secret keys if possible, and enforce strong authentication and credential management policies to reduce risk of credential compromise. Conduct regular file system permission audits to minimize the data accessible by the NetworkService account. Employ application-layer firewalls or web application firewalls (WAFs) to detect and block suspicious requests targeting the vulnerable endpoint. Additionally, monitor logs for unusual access patterns to the '/UserWeb/Common/MarkupServices.ashx' endpoint. Finally, educate users about the risks of credential sharing and enforce least privilege principles to limit the impact of potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:56:24.406Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e81d26ba0e608b4fac9439

Added to database: 10/9/2025, 8:37:58 PM

Last enriched: 10/9/2025, 8:54:55 PM

Last updated: 10/11/2025, 9:23:04 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats